買這商品的人也買了...
-
$620$490 -
$650$507 -
$680$578 -
$490$417 -
$490$382 -
$490$417 -
$550$468 -
$790$521 -
$450$383 -
$780$663 -
$680$578 -
$650$507 -
$620$484 -
$680$578 -
$980$774 -
$580$458 -
$520$442 -
$880$695 -
$680$537 -
$450$356 -
$620$527 -
$780$616 -
$680$449 -
$720$569 -
$960$941
相關主題
商品描述
A scientific approach to the new field of critical infrastructure protection
This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.
The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure—the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.
A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows® and Apple Macintosh® compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.
This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.
Table of Contents
Preface.
About the Author.
1. Strategy.
2. Origins.
3. Challenges.
4. Networks.
5. Vulnerability Analysis.
6. Risk Analysis.
7. Water.
8. SCADA.
9. Power.
10. Energy.
11. Telecommunications.
12. Internet.
13. Cyber-Threats.
14. Cyber-Security.
商品描述(中文翻譯)
**描述**
這本書提供了一種獨特的科學方法來應對新興的關鍵基礎設施保護領域:它利用網路理論、優化理論和模擬軟體來分析和理解基礎設施部門的演變、脆弱性所在,以及如何最佳地進行保護。作者展示了水、電力、能源、電信和互聯網等多樣化的基礎設施部門具有驚人相似的結構。這一觀察導致了對所有這些部門進行脆弱性分析的嚴謹方法。分析師可以決定最佳的資金分配方式,以最小化風險,無論行業部門如何。
這本及時的書籍所探討的關鍵問題是:應該保護什麼,如何保護?作者提出,答案在於將國家的稀缺資源分配給每個基礎設施中最關鍵的組件——所謂的關鍵節點。以網路理論為基礎,讀者將學習如何識別少數幾個關鍵節點,然後分配資源以減少或消除整個部門的風險。
本書後面附有一套全面的電子媒體,包含在CD-ROM中,支持課堂和自學教學。學生可以將這些專業製作的音視頻講座複製到PC(兼容Microsoft Windows®和Apple Macintosh®)上,以便隨時重複觀看。這本書的另一個獨特特點是開源軟體,用於演示概念並簡化脆弱性分析所需的數學。更新以及討論論壇可從 www.CHDS.us 獲得。
這本書對於所有負責評估脆弱性以及開發和實施保護系統的企業、政府機構和軍事專業人員來說都是必不可少的。此外,這本書也推薦給學習國家安全、計算機及其他基礎設施安全問題的高年級本科生和研究生。
**目錄**
前言
關於作者
1. 策略
2. 起源
3. 挑戰
4. 網路
5. 脆弱性分析
6. 風險分析
7. 水
8. SCADA
9. 電力
10. 能源
11. 電信
12. 互聯網
13. 網路威脅
14. 網路安全