Title:
Critical information infrastructures : resilience and protection
Personal Author:
Publication Information:
New York : Springer, 2007
Physical Description:
xi, 277 p. ; 24 cm.
ISBN:
9780387718613
General Note:
Available in online version
Added Title:
Critical Information Infrastructures [electronic resource]: Resilience and Protection
Electronic Access:
Fulltext
DSP_RESTRICTION_NOTE:
Remote access restricted to users with a valid UTM ID via VPN
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010177470 | QA76.9.A25 H97 2007 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world - including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Table of Contents
Chapter 1 Introduction | p. 1 |
Chapter 2 Definitions and Assumptions | p. 8 |
Chapter 3 Critical Infrastructures and Critical Information Infrastructures: Approaches by Geography | p. 19 |
Chapter 4 Critical Infrastructures and Critical Information Infrastructures: by Type | p. 45 |
Chapter 5 Critical Information Infrastructure | p. 61 |
Chapter 6 Some Political, Economic, Social, Technological, Environmental, Legal and Other Process Effects on Critical Infrastructures | p. 77 |
Chapter 7 Comments on Standards in Information Security, Disaster Recovery, Business Continuity and Business Resilience | p. 94 |
Chapter 8 A Tangential Threat To OECD Resilience: The Twenty-First Century East India Company | p. 145 |
Chapter 9 Resilience and Outsourcing Call Centers Offshore: A Case Study | p. 150 |
Chapter 10 Information Infrastructure: Resilience, Recovery, and Security | p. 158 |
Chapter 11 A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructures | p. 176 |
Chapter 12 General Summary and Conclusions | p. 194 |
Chapter 13 A Manifesto for Change | p. 198 |
Appendix | |
1 Introduction | p. 201 |
2 Bibliographies/Lists/Directories/Surveys/Search Engines | p. 202 |
3 Books - Arranged Alphabetically by Subject | p. 206 |
Apache | p. 206 |
Auditing and Security | p. 206 |
Backup (In Terms of Backing Up Data on Computers) | p. 206 |
Carnivore | p. 206 |
Certification for Security Professionals | p. 207 |
CISCO | p. 209 |
Code (As In Computer Code) | p. 209 |
Computer Security | p. 209 |
Corporate Security | p. 209 |
Crime/Forensics/Malice/Malware | p. 210 |
Critical Infrastructure | p. 211 |
Cryptography | p. 211 |
Data/Databases and Related Issues | p. 212 |
Data Mining (The Process of Searching Data for Specific Information) | p. 213 |
Disaster Recovery and Contingency Planning (Relevant To Technology) | p. 213 |
eBusiness | p. 215 |
Firewalls | p. 215 |
Hacking | p. 216 |
Hardening | p. 217 |
Java | p. 219 |
Kerberos | p. 220 |
Linux | p. 220 |
Microsoft and Microsoft Windows General | p. 220 |
Mobile Communications/Mobility | p. 221 |
.NET | p. 221 |
Network Security | p. 221 |
Operational Risk | p. 223 |
Public Key Infrastructure (PKI) | p. 223 |
Positive Messages | p. 223 |
Reliability | p. 223 |
Radio Frequency Identification (RFID) | p. 223 |
Securing and Security | p. 223 |
Sniffing | p. 226 |
Spam | p. 226 |
Steganography | p. 226 |
Virtual Private Networks (VPNs) | p. 227 |
Warfare and Politics | p. 227 |
Wireless | p. 228 |
WordPerfect | p. 228 |
4 Articles - Arranged Alphabetically By Subject | p. 228 |
Asymmetric Warfare | p. 229 |
Banking | p. 229 |
BS7799 | p. 229 |
Critical Infrastructure | p. 229 |
Cryptography | p. 229 |
Computer Crime and Security | p. 230 |
Cyberwar and Netwar | p. 230 |
Clash of Civilizations | p. 230 |
Data Related | p. 230 |
Defense | p. 230 |
Digital Development | p. 230 |
Dot Com Dreams | p. 230 |
Elections | p. 230 |
Electronic Intrusion | p. 230 |
Electronic Mail | p. 231 |
Electronic Signature | p. 231 |
Erlang | p. 231 |
Environment | p. 231 |
Freedom of Information | p. 231 |
Fuel Crisis | p. 232 |
Information Security and Warfare, etc. | p. 232 |
Java | p. 232 |
Microsoft and Cisco | p. 233 |
National Information Infrastructure | p. 233 |
Network Security | p. 233 |
Optimistic Message Logging | p. 233 |
Open Systems | p. 233 |
Obstructive Marketing | p. 233 |
Resilience, Robustness, Reliability | p. 233 |
Radio Frequency Identification (RFID) | p. 234 |
Security, etc. | p. 234 |
Strategic Information Warfare | p. 235 |
Telecommunications Networks | p. 235 |
URL (Uniform or Universal Resource Locator - Web Address) Security | p. 235 |
Utilities | p. 235 |
Video Coding | p. 236 |
Wire Pirates | p. 236 |
Year 2000 Issues (Y2K) | p. 236 |
5 Regular Publications - Arranged Alphabetically By Title | p. 236 |
6 Links - Arranged Alphabetically by Subject and Site Name | p. 239 |
Academia | p. 239 |
Associations/Institutes/Societies/Organizations, etc | p. 241 |
Asymmetric and Information Warfare | p. 243 |
Australia | p. 244 |
Austria | p. 244 |
Canada | p. 245 |
Finland | p. 246 |
France | p. 247 |
Germany | p. 247 |
International Organizations | p. 249 |
Italy | p. 250 |
Lawyers | p. 250 |
Police | p. 250 |
The Netherlands | p. 251 |
New Zealand | p. 252 |
Norway | p. 252 |
Russia | p. 253 |
Sweden | p. 253 |
Switzerland | p. 253 |
United Kingdom | p. 255 |
United States | p. 256 |
Vendor Sites | p. 258 |
General Information - Alphabetically by Site | p. 261 |
Index | p. 267 |