Table | Card | RUSMARC | |
Allowed Actions:
Group: Anonymous Network: Internet |
Annotation
The eleventh volume of a highly acclaimed series on critical infrastructure and homeland security, Information Technology Protection and Homeland Security is an eye-opening account of a complex sector. This book describes the processes needed to identify assets, assess risk, implement protective programs, and measure their effectiveness.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
ILC SPbPU Local Network | All | |||||
Internet | Authorized users SPbPU | |||||
Internet | Anonymous |
Table of Contents
- Contents
- Acronyms and Abbreviations
- Preface
- Prologue
- Ch01. Introduction
- Ch02. Digital Network Security
- Ch03. SCADA
- Ch04. IT Security Action Plan
- Ch05. Resilience Measurement Index
- Ch06. Critical Infrastructure Security and Resilience
- Ch07. Vulnerability Assessment
- Ch08. Incident Responseand Reporting
- Ch09. Security Techniques and Hardware
- Ch10. The Paradigm Shift
- Ch11. Preparation
- Glossary
- Index
- About the Author
Usage statistics
pdf/2102310.pdf
Access count: 0
Last 30 days: 0 Detailed usage statistics |
epub/2102310.epub
Access count: 0
Last 30 days: 0 Detailed usage statistics |