Cover image for Critical information infrastructures : resilience and protection
Title:
Critical information infrastructures : resilience and protection
Personal Author:
Publication Information:
New York : Springer, 2007
Physical Description:
xi, 277 p. ; 24 cm.
ISBN:
9780387718613
General Note:
Available in online version
Added Title:
Critical Information Infrastructures [electronic resource]: Resilience and Protection
Electronic Access:
Fulltext
DSP_RESTRICTION_NOTE:
Remote access restricted to users with a valid UTM ID via VPN

Available:*

Library
Item Barcode
Call Number
Material Type
Status
Searching...
30000010177470 QA76.9.A25 H97 2007 Open Access Book
Searching...

On Order

Summary

Summary

The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world - including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.


Table of Contents

Chapter 1 Introductionp. 1
Chapter 2 Definitions and Assumptionsp. 8
Chapter 3 Critical Infrastructures and Critical Information Infrastructures: Approaches by Geographyp. 19
Chapter 4 Critical Infrastructures and Critical Information Infrastructures: by Typep. 45
Chapter 5 Critical Information Infrastructurep. 61
Chapter 6 Some Political, Economic, Social, Technological, Environmental, Legal and Other Process Effects on Critical Infrastructuresp. 77
Chapter 7 Comments on Standards in Information Security, Disaster Recovery, Business Continuity and Business Resiliencep. 94
Chapter 8 A Tangential Threat To OECD Resilience: The Twenty-First Century East India Companyp. 145
Chapter 9 Resilience and Outsourcing Call Centers Offshore: A Case Studyp. 150
Chapter 10 Information Infrastructure: Resilience, Recovery, and Securityp. 158
Chapter 11 A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructuresp. 176
Chapter 12 General Summary and Conclusionsp. 194
Chapter 13 A Manifesto for Changep. 198
Appendix
1 Introductionp. 201
2 Bibliographies/Lists/Directories/Surveys/Search Enginesp. 202
3 Books - Arranged Alphabetically by Subjectp. 206
Apachep. 206
Auditing and Securityp. 206
Backup (In Terms of Backing Up Data on Computers)p. 206
Carnivorep. 206
Certification for Security Professionalsp. 207
CISCOp. 209
Code (As In Computer Code)p. 209
Computer Securityp. 209
Corporate Securityp. 209
Crime/Forensics/Malice/Malwarep. 210
Critical Infrastructurep. 211
Cryptographyp. 211
Data/Databases and Related Issuesp. 212
Data Mining (The Process of Searching Data for Specific Information)p. 213
Disaster Recovery and Contingency Planning (Relevant To Technology)p. 213
eBusinessp. 215
Firewallsp. 215
Hackingp. 216
Hardeningp. 217
Javap. 219
Kerberosp. 220
Linuxp. 220
Microsoft and Microsoft Windows Generalp. 220
Mobile Communications/Mobilityp. 221
.NETp. 221
Network Securityp. 221
Operational Riskp. 223
Public Key Infrastructure (PKI)p. 223
Positive Messagesp. 223
Reliabilityp. 223
Radio Frequency Identification (RFID)p. 223
Securing and Securityp. 223
Sniffingp. 226
Spamp. 226
Steganographyp. 226
Virtual Private Networks (VPNs)p. 227
Warfare and Politicsp. 227
Wirelessp. 228
WordPerfectp. 228
4 Articles - Arranged Alphabetically By Subjectp. 228
Asymmetric Warfarep. 229
Bankingp. 229
BS7799p. 229
Critical Infrastructurep. 229
Cryptographyp. 229
Computer Crime and Securityp. 230
Cyberwar and Netwarp. 230
Clash of Civilizationsp. 230
Data Relatedp. 230
Defensep. 230
Digital Developmentp. 230
Dot Com Dreamsp. 230
Electionsp. 230
Electronic Intrusionp. 230
Electronic Mailp. 231
Electronic Signaturep. 231
Erlangp. 231
Environmentp. 231
Freedom of Informationp. 231
Fuel Crisisp. 232
Information Security and Warfare, etc.p. 232
Javap. 232
Microsoft and Ciscop. 233
National Information Infrastructurep. 233
Network Securityp. 233
Optimistic Message Loggingp. 233
Open Systemsp. 233
Obstructive Marketingp. 233
Resilience, Robustness, Reliabilityp. 233
Radio Frequency Identification (RFID)p. 234
Security, etc.p. 234
Strategic Information Warfarep. 235
Telecommunications Networksp. 235
URL (Uniform or Universal Resource Locator - Web Address) Securityp. 235
Utilitiesp. 235
Video Codingp. 236
Wire Piratesp. 236
Year 2000 Issues (Y2K)p. 236
5 Regular Publications - Arranged Alphabetically By Titlep. 236
6 Links - Arranged Alphabetically by Subject and Site Namep. 239
Academiap. 239
Associations/Institutes/Societies/Organizations, etcp. 241
Asymmetric and Information Warfarep. 243
Australiap. 244
Austriap. 244
Canadap. 245
Finlandp. 246
Francep. 247
Germanyp. 247
International Organizationsp. 249
Italyp. 250
Lawyersp. 250
Policep. 250
The Netherlandsp. 251
New Zealandp. 252
Norwayp. 252
Russiap. 253
Swedenp. 253
Switzerlandp. 253
United Kingdomp. 255
United Statesp. 256
Vendor Sitesp. 258
General Information - Alphabetically by Sitep. 261
Indexp. 267