Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • GBV  (4,069)
Type of Publication
Consortium
  • GBV  (4,069)
  • BSZ  (1,125)
  • 1
    UID:
    (DE-627)1657980464
    Format: 1 online resource (399 pages)
    Edition: 2nd ed.
    ISBN: 9781118817704
    Content: "...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.
    Content: Intro -- Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation -- Copyright -- Contents -- Preface -- How to Use this Book -- Acknowledgment -- Part I Origins of Homeland Security and Critical Infrastructure Protection Policy -- Chapter 1 Origins of Critical Infrastructure Protection -- 1.1 Recognition -- 1.2 Natural Disaster Recovery -- 1.3 Definitional Phase -- 1.4 Public-Private Cooperation -- 1.5 Federalism: Whole of Government -- 1.6 Infrastructure Protection within DHS -- 1.7 Implementing a Risk Strategy -- 1.7.1 Risk-Informed Decision-Making -- 1.7.2 Resilience-Informed Decision-Making -- 1.7.3 Prevention or Response? -- 1.8 Analysis -- 1.8.1 The PPP Conundrum -- 1.8.2 The Information-Sharing Conundrum -- 1.8.3 Climate Change Conundrum -- 1.8.4 The Funding Conundrum -- 1.8.5 Spend 80% on 20% of the Country -- 1.9 Exercises -- References -- Part II Theory and Foundations -- Chapter 2 Risk Strategies -- 2.1 EUT -- 2.1.1 Threat-Asset Pairs -- 2.2 PRA and Fault Trees -- 2.2.1 An Example: Your Car -- 2.3 MBRA and Resource Allocation -- 2.3.1 Another Example: Redundant Power -- 2.4 PRA in the Supply Chain -- 2.5 Protection versus Response -- 2.6 Threat Is an Output -- 2.7 Bayesian Belief Networks -- 2.8 A BN for Threat -- 2.9 Risk of a Natural Disaster -- 2.10 Earthquakes -- 2.11 Black Swans and Risk -- 2.12 Black Swan Floods -- 2.13 Are Natural Disasters Getting Worse? -- 2.14 Black Swan al Qaeda Attacks -- 2.15 Black Swan Pandemic -- 2.16 Risk and Resilience -- 2.17 Exercises -- References -- Chapter 3 Theories of Catastrophe -- 3.1 NAT -- 3.2 Blocks and Springs -- 3.3 Bak's Punctuated Equilibrium Theory -- 3.4 TOC -- 3.4.1 The State Space Diagram -- 3.5 The U.S. Electric Power Grid -- 3.6 POE -- 3.6.1 The Great Recessions -- 3.6.2 Too Much Money -- 3.7 Competitive Exclusion -- 3.7.1 Gause's Law.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9781118817636
    Additional Edition: Erscheint auch als Druck-Ausgabe 9781118817636
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    London : BISRA
    UID:
    (DE-627)470382228
    Format: 4 S
    Series Statement: British Steel Corporation group research report 86
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Battle Creek, Mich. : Review and Herald
    UID:
    (DE-627)824121996
    Format: 182 S.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New York : John Wiley & Sons, Incorporated
    UID:
    (DE-627)1658137817
    Format: 1 online resource (526 pages)
    Edition: 1st ed.
    ISBN: 9780470400784
    Content: T. G. Lewis is Professor of Computer Science at the Naval Postgraduate School, Monterey, CA. He has written over thirty books during the course of his extensive career. Dr. Lewis is the former vice president of development for Eastman Kodak.
    Content: Intro -- NETWORK SCIENCE -- CONTENTS -- Preface/Foreword -- 1 Origins -- 1.1 What Is Network Science? -- 1.2 A Brief History of Network Science -- 1.3 General Principles -- 2 Graphs -- 2.1 Set-Theoretic Definition of a Graph -- 2.2 Matrix Algebra Definition of a Graph -- 2.3 The Bridges of Königsberg Graph -- 2.4 Spectral Properties of Graphs -- 2.5 Types of Graphs -- 2.6 Topological Structure -- 2.7 Graphs in Software -- 2.8 Exercises -- 3 Regular Networks -- 3.1 Diameter, Centrality, and Average Path Length -- 3.2 Binary Tree Network -- 3.3 Toroidal Network -- 3.4 Hypercube Networks -- 3.5 Exercises -- 4 Random Networks -- 4.1 Generation of Random Networks -- 4.2 Degree Distribution of Random Networks -- 4.3 Entropy of Random Networks -- 4.4 Properties of Random Networks -- 4.5 Weak Ties in Random Networks -- 4.6 Randomization of Regular Networks -- 4.7 Analysis -- 4.8 Exercises -- 5 Small-World Networks -- 5.1 Generating a Small-World Network -- 5.2 Properties of Small-World Networks -- 5.3 Phase Transition -- 5.4 Navigating Small Worlds -- 5.5 Weak Ties in Small-World Networks -- 5.6 Analysis -- 5.7 Exercises -- 6 Scale-Free Networks -- 6.1 Generating a Scale-Free Network -- 6.2 Properties of Scale-Free Networks -- 6.3 Navigation in Scale-Free Networks -- 6.4 Analysis -- 6.5 Exercises -- 7 Emergence -- 7.1 What is Network Emergence? -- 7.2 Emergence in the Sciences -- 7.3 Genetic Evolution -- 7.4 Designer Networks -- 7.5 Permutation Network Emergence -- 7.6 An Application of Emergence -- 7.7 Exercises -- 8 Epidemics -- 8.1 Epidemic Models -- 8.2 Persistent Epidemics in Networks -- 8.3 Network Epidemic Simulation Software -- 8.4 Countermeasures -- 8.5 Exercises -- 9 Synchrony -- 9.1 To Sync or Not to Sync -- 9.2 A Cricket Social Network -- 9.3 Kirchhoff Networks -- 9.4 Pointville Electric Power Grid -- 9.5 Exercises -- 10 Influence Networks.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9780470331880
    Additional Edition: Erscheint auch als Druck-Ausgabe Lewis, Theodore Gyle Network science Hoboken, NJ : Wiley, 2009 0470331887
    Additional Edition: 9780470331880
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Netzplanung ; Netzwerktheorie
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    (DE-627)586275371
    Format: 6 Abb.
    ISSN: 1362-766X
    In: Cargo systems, London : IIR Publications Ltd., 1994, 2005: Bd.: 32, H.: Apr., S.: 16-21, 1362-766X
    In: volume:32
    In: year:2005
    In: pages:16-21
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    (DE-627)586282432
    Format: 6 Abb.
    ISSN: 1362-766X
    In: Cargo systems, London : IIR Publications Ltd., 1994, 2005: Bd.: 32, H.: Sep., S.: 43-51, 1362-766X
    In: volume:32
    In: year:2005
    In: pages:43-51
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Article
    Article
    Croydon
    Show associated volumes
    UID:
    (DE-627)586327231
    Format: 1 Abb. , 1 Tab.
    ISSN: 0968-9001
    In: Logistics Europe, Berkhamsted, Hertfordshire : Hill Communications Ltd., 1996, 2003: Bd.: 11, H.: Sep., S.: 26-32, 0968-9001
    In: volume:11
    In: year:2003
    In: pages:26-32
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Article
    Article
    London
    Show associated volumes
    UID:
    (DE-627)586404694
    Format: 4 Abb. , 3 Tab.
    ISSN: 0968-9001
    In: Logistics Europe, Berkhamsted, Hertfordshire : Hill Communications Ltd., 1996, 2001: Bd.: 9, H.: Apr., S.: 22-27, 0968-9001
    In: volume:9
    In: year:2001
    In: pages:22-27
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Article
    Article
    London
    Show associated volumes
    UID:
    (DE-627)586407820
    Format: 1 Abb. , 2 Tab.
    ISSN: 0968-9001
    In: Logistics Europe, Berkhamsted, Hertfordshire : Hill Communications Ltd., 1996, 2001: Bd.: 9, H.: Jul., S.: 26-32, 0968-9001
    In: volume:9
    In: year:2001
    In: pages:26-32
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Article
    Article
    London
    Show associated volumes
    UID:
    (DE-627)586427317
    Format: 4 Abb. , 1 Tab.
    ISSN: 0968-9001
    In: Logistics Europe, Berkhamsted, Hertfordshire : Hill Communications Ltd., 1996, 2000: Bd.: 8, H.: Sep., S.: 18-23, 0968-9001
    In: volume:8
    In: year:2000
    In: pages:18-23
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages