The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures throughout the world - including the technological, political, economic, strategic and defensive.
This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Key Features:
This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Key Features:
- Definitions, a detailed appendix, and selected topics make the book a good point of entry into the field of Critical Information Infrastructures
- Author has an array of experience in the private and public sectors, including involvement with the oil and gas, finance, food, health, government service, and law and order infrastructures
- Thorough investigation of various elements of critical information infrastructures using specific case studies of historic and contemporary importance
- Comprehensive structure relevant and accessible to both professionals and academics
- New approach to looking at resilience, critical infrastructure and obstructive marketing
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
From the reviews: A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government representatives, policy advisors, academic researchers and students of resilience. The work is concise and to the point and allows the reader to familiarize themselves speedily with a number of pressing security issues. The historical points cited are useful with respect to underpinning the key themes covered and the well crafted writing style assists the reader throughout. It can also be stated that the insights and examples drawn from various countries and the public-private sector issues raised are worthy of inclusion. The points made in Chapter 13: A Manifesto for Change, are well argued and should be taken up by policy makers as they are relevant and necessary. -- CAMIS Newsletter, Volume 3, Number 5, 2007 "The book focuses on the protection of critical information infrastructures, and providing for resilience in recovery following successful attacks. ... The book is probably best used in one of two ways: to skim, in order to get a quick overview of the issues and Hyslop's thoughts on solutions ... or to build one's own view by reading and evaluating the arguments and solutions, and then using the references in the bibliography to obtain additional information." (Gordon B. Davis, ACM Computing Reviews, Vol. 49 (12), December, 2008)