pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: CRITICAL INFRASTRUCTURE PROTECTION III
THIRD IFIP WG 11.10 INTERNATIONAL CONFERENCE, HANOVER, NEW HAMPSHIRE, USA, MARCH 23-25, 2009, REVISED SELECTED PAPERS
By: Charles Palmer (Editor), Sujeet Shenoi (Editor)
Format: Paperback

List price: £110.00


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3642260403
ISBN 13: 9783642260407
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 6 April, 2012
Edition: 2009 ed.
Series: IFIP Advances in Information and Communication Technology 311
Pages: 257
Synopsis: The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
Illustrations: 58 Illustrations, black and white; XVI, 257 p. 58 illus.
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
A COLLECTION OF SELECT APHORISMS AND MAX (HB)
A COLLECTION OF SELECT APHORISMS AND MAX (PB)
A COLLECTION OF SELECT APHORISMS AND MAX (PB)
A COLLECTION OF SELECT APHORISMS AND MAXIMS
A COLLECTION OF SELECT APHORISMS AND MAXIMS (HB)
A COLLECTION OF SELECT APHORISMS AND MAXIMS (PB)
A COLLECTION OF SELECT APHORISMS AND MAXIMS, EXTRACTED FROM THE MOST EMINENT AUTHORS
A COLLECTION OF SELECT APHORISMS AND MAXIMS, EXTRACTED FROM THE MOST EMINENT AUTHORS...
A COLLECTION OF SELECT APHORISMS AND MAXIMS, WITH SEVERAL HISTORICAL OBSERVATIONS EXTRACTED FROM THE MOST EMINENT AUTHORS (1748) (HB)
A COLLECTION OF SELECT APHORISMS AND MAXIMS; WITH SEVERAL HISTORICAL OBSERVATIONS
A COLLECTION OF SELECT APHORISMS AND MAXIMS; WITH SEVERAL HISTORICAL OBSERVATIONS
A COLLECTION OF SELECT APHORISMS AND MAXIMS; WITH SEVERAL HISTORICAL OBSERVATIONS (PB)
A COLLECTION OF SELECT APHORISMS AND MAXIMS; WITH SEVERAL HISTORICAL OBSERVATIONS EXTRACTED FROM THE MOST EMINENT AUTHORS
A DEFENCE OF PASSIVE OBEDIENCE AND NON-R (HB)
A DEFENCE OF PASSIVE OBEDIENCE AND NON-R (PB)
A PERSWASIVE TO PAROCHIAL COMMUNION. ... (HB)
A PERSWASIVE TO PAROCHIAL COMMUNION. ... (PB)
A PERSWASIVE TO PAROCHIAL COMMUNION. IN (PB)
A PERSWASIVE TO PAROCHIAL COMMUNION. IN (HB)
A SERMON PREACH''D AT TOWCESTER, ON THE F (HB)
A SERMON PREACH''D AT TOWCESTER, ON THE F (PB)
ADVANCES IN DIGITAL FORENSICS (HB)
ADVANCES IN DIGITAL FORENSICS (PB)
ADVANCES IN DIGITAL FORENSICS II (HB)
ADVANCES IN DIGITAL FORENSICS II (PB)
ADVANCES IN DIGITAL FORENSICS III (HB)
ADVANCES IN DIGITAL FORENSICS III (PB)
ADVANCES IN DIGITAL FORENSICS IV (HB)
ADVANCES IN DIGITAL FORENSICS IV (PB)
ADVANCES IN DIGITAL FORENSICS IX (HB)
ADVANCES IN DIGITAL FORENSICS IX (PB)
ADVANCES IN DIGITAL FORENSICS V (HB)
ADVANCES IN DIGITAL FORENSICS V (PB)
ADVANCES IN DIGITAL FORENSICS VI (HB)
ADVANCES IN DIGITAL FORENSICS VI (PB)
ADVANCES IN DIGITAL FORENSICS VII (HB)
ADVANCES IN DIGITAL FORENSICS VII (PB)
ADVANCES IN DIGITAL FORENSICS VIII (HB)
ADVANCES IN DIGITAL FORENSICS VIII (PB)
ADVANCES IN DIGITAL FORENSICS X (HB)
ADVANCES IN DIGITAL FORENSICS X (PB)
ADVANCES IN DIGITAL FORENSICS XI (HB)
ADVANCES IN DIGITAL FORENSICS XII (HB)
ADVANCES IN DIGITAL FORENSICS XIII (HB)
ALTERNATE REALITY GAMES
ALTERNATE REALITY GAMES (HB)
ALTERNATE REALITY GAMES (PB)
AVOIDED DEFORESTATION
AVOIDED DEFORESTATION
AVOIDED DEFORESTATION
AVOIDED DEFORESTATION
AVOIDED DEFORESTATION (HB)
AVOIDED DEFORESTATION (PB)
CRITICAL INFRASTRUCTURE PROTECTION
CRITICAL INFRASTRUCTURE PROTECTION (HB)
CRITICAL INFRASTRUCTURE PROTECTION (PB)
CRITICAL INFRASTRUCTURE PROTECTION II (HB)
CRITICAL INFRASTRUCTURE PROTECTION II (PB)
CRITICAL INFRASTRUCTURE PROTECTION III (HB)
CRITICAL INFRASTRUCTURE PROTECTION IV (HB)
CRITICAL INFRASTRUCTURE PROTECTION IV (PB)
CRITICAL INFRASTRUCTURE PROTECTION IX (HB)
CRITICAL INFRASTRUCTURE PROTECTION V (HB)
CRITICAL INFRASTRUCTURE PROTECTION V (PB)
CRITICAL INFRASTRUCTURE PROTECTION VI (HB)
CRITICAL INFRASTRUCTURE PROTECTION VI (PB)
CRITICAL INFRASTRUCTURE PROTECTION VII (HB)
CRITICAL INFRASTRUCTURE PROTECTION VII (PB)
CRITICAL INFRASTRUCTURE PROTECTION VIII (HB)
CRITICAL INFRASTRUCTURE PROTECTION VIII (PB)
CRITICAL INFRASTRUCTURE PROTECTION X (HB)
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY (HB)
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY (PB)
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
SOCIAL MEDIA IN DISASTER RESPONSE
THE OUTCOMES AND THEIR DETERMINANTS FROM COMMUNITY-COMPANY CONTRACTING OVER FOREST USE IN POST-DECENTRALIZATION INDONESIA (PB)
VALUING THE ENVIRONMENT IN DEVELOPING COUNTRIES (HB)
VALUING THE ENVIRONMENT IN DEVELOPING COUNTRIES (PB)
VIRTUAL REALITY BLUEPRINTS (PB)

TOP SELLERS IN THIS CATEGORY
Practical Vim (Paperback)
The Pragmatic Programmers
Our Price : £20.69
more details
Introduction to Machine Learning with Python (Paperback)
O'Reilly Media, Inc, USA
Our Price : £35.03
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
Learning to Program in Python (Paperback)
PG Online Limited
Our Price : £13.30
more details
Effective Java (Paperback)
Pearson Education (US)
Our Price : £39.59
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer programming


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
World’s Worst Superheroes GET READY FOR SOME SUPERSIZED FUN!
add to basket





New
No Cheese, Please! A fun picture book for children with food allergies - full of friendship and super-cute characters!Little Mo the mouse is having a birthday party.
add to basket

New
My Brother Is a Superhero Luke is massively annoyed about this, but when Zack is kidnapped by his arch-nemesis, Luke and his friends have only five days to find him and save the world...
add to basket


Picture Book
Animal Actions: Snap Like a Crab
By:
The first title in a new preschool series from Guilherme Karsten.
add to basket