Critical Infrastructure Protection XV 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15–16, 2021, Revised Selected Papers

Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: · Themes and Issues · Industrial...

Full description

Bibliographic Details
Other Authors: Staggs, Jason (Editor), Shenoi, Sujeet (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2022, 2022
Edition:1st ed. 2022
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03740nmm a2200361 u 4500
001 EB002009474
003 EBX01000000000000001172373
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220201 ||| eng
020 |a 9783030935115 
100 1 |a Staggs, Jason  |e [editor] 
245 0 0 |a Critical Infrastructure Protection XV  |h Elektronische Ressource  |b 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15–16, 2021, Revised Selected Papers  |c edited by Jason Staggs, Sujeet Shenoi 
250 |a 1st ed. 2022 
260 |a Cham  |b Springer International Publishing  |c 2022, 2022 
300 |a XIV, 253 p. 69 illus  |b online resource 
653 |a Computer Communication Networks 
653 |a Software engineering 
653 |a Software Engineering 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Data protection 
653 |a Computer engineering 
653 |a Data and Information Security 
700 1 |a Shenoi, Sujeet  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a IFIP Advances in Information and Communication Technology 
856 4 0 |u https://doi.org/10.1007/978-3-030-93511-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: · Themes and Issues · Industrial Control Systems Security · Telecommunications Systems Security · Infrastructure Security This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twelve edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held virtually in the spring of 2021.  
520 |a Critical Infrastructure Protection XV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA. 
520 |a CRITICAL INFRASTRUCTURE PROTECTION XV Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.