Sorry, the book that you are looking for is not available right now.
We did a search for other books with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your book.
This reference work will meet a recognized need in homeland security research by promoting effective collaboration between research scientists, funding agencies, and the homeland security community.
Part of the 15-volume series The Wiley Handbook of Science and Technology for Homeland Security, Risk Analysis includes over 55 articles by international contributors on vulnerability assessment and risk modeling.
Selected Table of Contents:
Republic of Korea.
European Union (EU).
The Forum of Incident Response and Security Teams (FIRST).
Group of Eight (G8).
North Atlantic Treaty Organization (NATO).
Organization for Economic Co-Operation and Development (OECD).
United Nations (UN).
The World Bank Group.
Classes of Vulnerabilities and Attacks.
Authentication, Authorization, Access Control, and Privilege Management.
Advanced Attacker Detection and Understanding with Emerging Honeynut Technologies.
Detection of Hidden Information, Covert Channels, and Information Flows.
Attack Traceback and Attribution.
Cyber Security Policy Specification and Management.
Cyber Security Standards.
Cyber Security Metrics and Measures.
Trusted Platforms: The Root of Security.
High Assurance: Provably Secure Systems and Architectures.
Security of Distributed, Ubiquitous, and Embedded Computing Platforms.
Security of Web Application and Services and Service-Oriented Architectures.
Cyber Security Technology Usability and Management.
Cyber Security Education, Training, and Awareness.
Industrial Process Control System Security.
Cyber Security for the Banking and Finance Sector.
System and Sector Interdependencies.
System and Sector Interdependencies: An Overview.
System and Sector Interdependencies: An Overview of Research and Development.
President?s Commission on Critical Infrastructure Protection.
Input-Output Modeling for Interdependent Infrastructure Sectors.
Application of a Conditional Risk Assessment Methodology for Prioritization of Critical Infrastructure.
Critical Infrastructure at Risk: A European Perspective.
Vulnerability Assessment Methodologies for Interdependent Systems.
Robustness, Resilience, and Security of National Critical Infrastructure Systems.
Inherently Secure Next-Generation Computing and Communication.
Networks for Reducing Cascading Impacts.
Implications of Regulation on the Protection of Critical Infrastructures.
Characterizing Infrastructure Failure Interdependencies to Inform Systemic Risk.
Managing Critical Infrastructure Interdependencies: The Ontario Approach.
Analysis of Cascading Infrastructure Failures.
Water Infrastructure Interdependencies.
Infrastructure Dependency Indicators.
Object-Oriented Approaches for Integrated Analysis of Interdependent Energy Networks.
Geospatial Data Support for Infrastructure Interdependencies Analysis.
The Military Roots of Critical Infrastructure Analysis and Attack.
Network Flow Approaches for Analyzing and Managing Disruptions to Interdependent Infrastructure Systems.
Number Of Pages: 4992
Published: 8th February 2010
Country of Publication: US
Dimensions (cm): 26.16 x 18.54 x 3.96
Edition Number: 1