Matches in Library of Congress for { <http://lccn.loc.gov/2007924497> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- 2007924497 contributor B11057174.
- 2007924497 created "c2007.".
- 2007924497 date "2007".
- 2007924497 date "c2007.".
- 2007924497 dateCopyrighted "c2007.".
- 2007924497 description "Chapter 2 Definitions and Assumptions 8 -- Chapter 3 Critical Infrastructures and Critical Information Infrastructures: Approaches by Geography 19 -- Chapter 4 Critical Infrastructures and Critical Information Infrastructures: by Type 45 -- Chapter 5 Critical Information Infrastructure 61 -- Chapter 6 Some Political, Economic, Social, Technological, Environmental, Legal and Other Process Effects on Critical Infrastructures 77 -- Chapter 7 Comments on Standards in Information Security, Disaster Recovery, Business Continuity and Business Resilience 94 -- Chapter 8 A Tangential Threat To OECD Resilience: The Twenty-First Century East India Company 145 -- Chapter 9 Resilience and Outsourcing Call Centers Offshore: A Case Study 150 -- Chapter 10 Information Infrastructure: Resilience, Recovery, and Security 158 -- Chapter 11 A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructures 176 -- Chapter 12 General Summary and Conclusions 194 -- Chapter 13 A Manifesto for Change 198 -- 2 Bibliographies/Lists/Directories/Surveys/Search Engines 202 -- 3 Books -- Arranged Alphabetically by Subject 206 -- Apache 206 -- Auditing and Security 206 -- Backup (In Terms of Backing Up Data on Computers) 206 -- Carnivore 206 -- Certification for Security Professionals 207 -- CISCO 209 -- Code (As In Computer Code) 209 -- Computer Security 209 -- Corporate Security 209 -- Crime/Forensics/Malice/Malware 210 -- Critical Infrastructure 211 -- Cryptography 211 -- Data/Databases and Related Issues 212 -- Data Mining (The Process of Searching Data for Specific Information) 213 -- Disaster Recovery and Contingency Planning (Relevant To Technology) 213 -- eBusiness 215 -- Firewalls 215 -- Hacking 216 -- Hardening 217 -- Java 219 -- Kerberos 220 -- Linux 220 -- Microsoft and Microsoft Windows General 220 -- Mobile Communications/Mobility 221 -- .NET 221 -- Network Security 221 -- Operational Risk 223 -- Public Key Infrastructure (PKI) 223 -- Positive Messages 223 -- Reliability 223 -- Radio Frequency Identification (RFID) 223 -- Securing and Security 223 -- Sniffing 226 -- Spam 226 -- Steganography 226 -- Virtual Private Networks (VPNs) 227 -- Warfare and Politics 227 -- Wireless 228 -- WordPerfect 228 -- 4 Articles -- Arranged Alphabetically By Subject 228 -- Asymmetric Warfare 229 -- Banking 229 -- BS7799 229 -- Critical Infrastructure 229 -- Cryptography 229 -- Computer Crime and Security 230 -- Cyberwar and Netwar 230 -- Clash of Civilizations 230 -- Data Related 230 -- Defense 230 -- Digital Development 230 -- Dot Com Dreams 230 -- Elections 230 -- Electronic Intrusion 230 -- Electronic Mail 231 -- Electronic Signature 231 -- Erlang 231 -- Environment 231 -- Freedom of Information 231 -- Fuel Crisis 232 -- Information Security and Warfare, etc. 232 -- Java 232 -- Microsoft and Cisco 233 -- National Information Infrastructure 233 -- Network Security 233 -- Optimistic Message Logging 233 -- Open Systems 233 -- Obstructive Marketing 233 -- Resilience, Robustness, Reliability 233 -- Radio Frequency Identification (RFID) 234 -- Security, etc. 234 -- Strategic Information Warfare 235 -- Telecommunications Networks 235 -- URL (Uniform or Universal Resource Locator -- Web Address) Security 235 -- Utilities 235 -- Video Coding 236 -- Wire Pirates 236 -- Year 2000 Issues (Y2K) 236 -- 5 Regular Publications -- Arranged Alphabetically By Title 236 -- 6 Links -- Arranged Alphabetically by Subject and Site Name 239 -- Academia 239 -- Associations/Institutes/Societies/Organizations, etc 241 -- Asymmetric and Information Warfare 243 -- Australia 244 -- Austria 244 -- Canada 245 -- Finland 246 -- France 247 -- Germany 247 -- International Organizations 249 -- Italy 250 -- Lawyers 250 -- Police 250 -- The Netherlands 251 -- New Zealand 252 -- Norway 252 -- Russia 253 -- Sweden 253 -- Switzerland 253 -- United Kingdom 255 -- United States 256 -- Vendor Sites 258 -- General Information -- Alphabetically by Site 261.".
- 2007924497 description "Includes bibliographical references (p. 201-265) and index.".
- 2007924497 extent "xi, 277 p. :".
- 2007924497 identifier "0387718613".
- 2007924497 identifier "9780387718613".
- 2007924497 identifier 2007924497-d.html.
- 2007924497 identifier 2007924497-t.html.
- 2007924497 issued "2007".
- 2007924497 issued "c2007.".
- 2007924497 language "eng".
- 2007924497 publisher "New York : Springer,".
- 2007924497 subject "005.8 23".
- 2007924497 subject "Computer security.".
- 2007924497 subject "Computers Access control.".
- 2007924497 subject "Information policy.".
- 2007924497 subject "QA76.9.A25 H97 2007".
- 2007924497 tableOfContents "Chapter 2 Definitions and Assumptions 8 -- Chapter 3 Critical Infrastructures and Critical Information Infrastructures: Approaches by Geography 19 -- Chapter 4 Critical Infrastructures and Critical Information Infrastructures: by Type 45 -- Chapter 5 Critical Information Infrastructure 61 -- Chapter 6 Some Political, Economic, Social, Technological, Environmental, Legal and Other Process Effects on Critical Infrastructures 77 -- Chapter 7 Comments on Standards in Information Security, Disaster Recovery, Business Continuity and Business Resilience 94 -- Chapter 8 A Tangential Threat To OECD Resilience: The Twenty-First Century East India Company 145 -- Chapter 9 Resilience and Outsourcing Call Centers Offshore: A Case Study 150 -- Chapter 10 Information Infrastructure: Resilience, Recovery, and Security 158 -- Chapter 11 A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructures 176 -- Chapter 12 General Summary and Conclusions 194 -- Chapter 13 A Manifesto for Change 198 -- 2 Bibliographies/Lists/Directories/Surveys/Search Engines 202 -- 3 Books -- Arranged Alphabetically by Subject 206 -- Apache 206 -- Auditing and Security 206 -- Backup (In Terms of Backing Up Data on Computers) 206 -- Carnivore 206 -- Certification for Security Professionals 207 -- CISCO 209 -- Code (As In Computer Code) 209 -- Computer Security 209 -- Corporate Security 209 -- Crime/Forensics/Malice/Malware 210 -- Critical Infrastructure 211 -- Cryptography 211 -- Data/Databases and Related Issues 212 -- Data Mining (The Process of Searching Data for Specific Information) 213 -- Disaster Recovery and Contingency Planning (Relevant To Technology) 213 -- eBusiness 215 -- Firewalls 215 -- Hacking 216 -- Hardening 217 -- Java 219 -- Kerberos 220 -- Linux 220 -- Microsoft and Microsoft Windows General 220 -- Mobile Communications/Mobility 221 -- .NET 221 -- Network Security 221 -- Operational Risk 223 -- Public Key Infrastructure (PKI) 223 -- Positive Messages 223 -- Reliability 223 -- Radio Frequency Identification (RFID) 223 -- Securing and Security 223 -- Sniffing 226 -- Spam 226 -- Steganography 226 -- Virtual Private Networks (VPNs) 227 -- Warfare and Politics 227 -- Wireless 228 -- WordPerfect 228 -- 4 Articles -- Arranged Alphabetically By Subject 228 -- Asymmetric Warfare 229 -- Banking 229 -- BS7799 229 -- Critical Infrastructure 229 -- Cryptography 229 -- Computer Crime and Security 230 -- Cyberwar and Netwar 230 -- Clash of Civilizations 230 -- Data Related 230 -- Defense 230 -- Digital Development 230 -- Dot Com Dreams 230 -- Elections 230 -- Electronic Intrusion 230 -- Electronic Mail 231 -- Electronic Signature 231 -- Erlang 231 -- Environment 231 -- Freedom of Information 231 -- Fuel Crisis 232 -- Information Security and Warfare, etc. 232 -- Java 232 -- Microsoft and Cisco 233 -- National Information Infrastructure 233 -- Network Security 233 -- Optimistic Message Logging 233 -- Open Systems 233 -- Obstructive Marketing 233 -- Resilience, Robustness, Reliability 233 -- Radio Frequency Identification (RFID) 234 -- Security, etc. 234 -- Strategic Information Warfare 235 -- Telecommunications Networks 235 -- URL (Uniform or Universal Resource Locator -- Web Address) Security 235 -- Utilities 235 -- Video Coding 236 -- Wire Pirates 236 -- Year 2000 Issues (Y2K) 236 -- 5 Regular Publications -- Arranged Alphabetically By Title 236 -- 6 Links -- Arranged Alphabetically by Subject and Site Name 239 -- Academia 239 -- Associations/Institutes/Societies/Organizations, etc 241 -- Asymmetric and Information Warfare 243 -- Australia 244 -- Austria 244 -- Canada 245 -- Finland 246 -- France 247 -- Germany 247 -- International Organizations 249 -- Italy 250 -- Lawyers 250 -- Police 250 -- The Netherlands 251 -- New Zealand 252 -- Norway 252 -- Russia 253 -- Sweden 253 -- Switzerland 253 -- United Kingdom 255 -- United States 256 -- Vendor Sites 258 -- General Information -- Alphabetically by Site 261.".
- 2007924497 title "Critical information infrastructures : resilience and protection / Maitland Hyslop.".
- 2007924497 type "text".