logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Critical Infrastructure Resilience and Sustainability Reader

Critical Infrastructure Resilience and Sustainability Reader (Paperback)

Ted G. Lewis (지은이)
Wiley
130,310원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
84,700원 -35% 0원
850원
83,850원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Critical Infrastructure Resilience and Sustainability Reader
eBook 미리보기

책 정보

· 제목 : Critical Infrastructure Resilience and Sustainability Reader (Paperback) 
· 분류 : 외국도서 > 인문/사회 > 정치학 > 테러리즘
· ISBN : 9781394179527
· 쪽수 : 288쪽
· 출판일 : 2023-09-26

목차

Preface

THE CHALLENGE               2

1.  The Evolution of Critical Infrastructure Protection       3

1.1. In the Beginning       4

1.2. Natural Disaster Recovery   7

1.3. What is Critical?        11

1.4. Public-private Cooperation 15

1.5. Federalism: Whole of government  17

2.  Defining CIKR Risk and Resilience        20

2.1. Risk Strategy             23

2.2. Resilience Strategy 25

2.3. Sustainability Strategy           28

2.4. The Four Horsemen 31

3. Weather/Climate Change/Global Warming      32

3.1. The Carrington Event             34

3.2. Black Bodies              36

3.3. The Lightening Rod 38

4. Consequences             39

4.1. Accidents/Aging/Neglect     40

4.2.  The Report Card      42

4.2.1.  The Domino Effect             42

4.3. Terrorism/Extremists            43

4.4. Cyber Exploits/Criminals       47

4.4.1. Black Hats               48

4.4.2. Cybercrime Pays  49

4.5. The Soft War              51

4.6. Cyberattacks and CIKR           53

5. Discussion      55

 

WHAT IS A CATASTROPHE?          2

1. Theories of Collapse   4

1.1. Normal Accident Theory (NAT)          5

1.2. Punctuated Equilibrium Theory (PET)              7

1.3. How Uncertain are Avalanches?        8

2.4. Self-organized Criticality       10

2. Complex Systems Theory        12

2.1 Tragedy of the Commons (TOC)          13

2.2. Paradox of Enrichment (POE)             17

2.3. Competitive Exclusion Principle (CEP)             21

2.4. Paradox of Redundancy (POR)           25

3. General Systems Theory          27

3.1. Emergence 27

3.2. Self-Organization    28

3.3. Preferential Attachment      29

4. Vulnerable Industrial Commons            30

4.1. TOC Failure 32

4.2. POE Failure 32

4.3. CEP Failure 33

4.4. POR Failure 34

5. Resilience vs. Sustainability     34

5.1. Black Swans               35

5.2. Catastrophe’s Long Tail         36

6. Discussion      37

 

ENERGY TRANSITION      2

1. A Sector Under Transition        2

2.1. Understanding Units and Measures 6

2.2. Consumption            7

3. Regulatory Structure of the Energy Sector        9

3.1. Evolution of Energy Sector Regulation            9

3.2. Energy Pipeline Regulations 10

3.3. The Energy ISAC       12

4. Legacy Fuels  13

4.1. Coal               13

4.2. The Rise of Oil and the Automobile 14

4.3. Natural Gas Middlemen       16

4.4. Nuclear Fuel              18

5. Legacy Energy Infrastructure  21

5.1. Oil Refineries            22

5.2. Oil Transmission and Distribution     24

5.3. Oil Storage 25

5.4. The Natural Gas Supply Chain             28

5.1. Critical Refineries    30

5.2. Critical Transmission Pipelines           31

6. Renewables  33

6.1. Solar – Photovoltaic (PV)      33

6.2. Wind             34

6.3. The Hydrogen Circle               36

6.4. Others         39

7. Batteries and Reservoirs          40

7.1. Modern Batteries    41

7.2. Grid Scale Storage – LDES     42

8. Discussion      43

 

THE VULNERABLE POWERGRID  1

1. What is the Grid?        5

2. The North American Grid         8

2.1. Grid Structure           10

2.2. ACE and Kirchhoff’s Law       13

2.3. Anatomy of a Blackout          14

3. Threat Analysis             19

3.1. Attack Scenario 1:  Disruption of fuel supply to power plants                19

3.2. Attack Scenario 2:  Destruction of major transformers            20

3.3. Attack Scenario 3:  Disruption of SCADA communications      23

3.4 Attack Scenario 4:  Creation of a cascading transmission failure            24

4. From Death Rays to Vertical Integration            26

4.1. Early Regulation       29

4.2. Deregulation and EPACT 1992             32

4.3. Energy Sector ISAC 34

5. Out of Orders 888 and 889 Comes Chaos          37

5.1. Economics Versus Physics    41

5.2. What Increases SOC?             44

5.3. A Change of Heart   48

6. The Architecture of 21st Century Grids              49

6.1.  The Future is Storage            51

6.2. SOC is Reduced        54

6.3.  Economics of Electrification               57

7. Discussion      60

 

WATER AND WATER TREATMENT              2

1. A Vanishing Resource 2

1.1. From Germs to Terrorists     5

1.2. Safe Drinking Water Act        6

1.3. The WaterISAC         8

2.  Foundations: SDWA of 1974   9

3. The Bio-terrorism Act of 2002 11

3.1. Is Water for Drinking?            12

3.2. Climate Change and Rot – the New Threats  15

4. The Architecture of Water Systems     18

4.1. The Law of the River               20

4.2. Resiliency of Water Pipeline Networks           21

5. Hetch Hetchy Water  23

5.1. Risk Analysis              26

5.2. Resilience Analysis  26

6. Threat Analysis             27

6.1. The Rational Actor  28

6.2. Hetch Hetchy Threat Analysis             29

6.3. Chem-Bio   30

6.4. Earthquakes              32

7. Water Resilience         33

7.1. Save the Pineapple Express 34

7.2. Grey Water 36

7.3. Desalination              37

7.4. Exemplar Israel         38

8. Discussion      39

 

TRANSPORTATION RENEWED     2

1. Transitioning a Vast and Complex Sector           2

1.1.   Government Leads the Way             4

1.2. Safety and Security 5

2. Roads at TOC Risk        8

2.1. The Road to Prosperity         13

2.2. Economic Impact     14

2.3. The National Highway System (NHS)               16

2.4. The Interstate Highway Network is Resilient 18

2.5. The NHS is Safer       19

2.6. The Future is Electric              21

3. Rail and Railroads        22

3.1. Birth of Regulation  25

3.2. Freight Trains            29

3.3. Passenger Rail           30

3.4. Terrorist Target Passenger Trains     32

3.5. Economics of Rail     34

4. Air Transportation      36

4.1. Resilience of the Hub-and-Spoke Network   41

4.2. Security of Commercial Air Travel     43

4.3. How Safe and Secure is Flying in the US?       47

4.4. Drones         48

4.5. eVTOLs        49

4.6. Commercial Airline Impact on Global Warming           49

5. Discussion      50

 

SUPPLY CHAINS 1

1. The World Is Flat, But Tilted    7

1.1. Supply Side Supply  10

1.2. The Father of Containerization          11

1.3. The Perils of Efficient Supply Chains 13

2. The World Trade Web               18

2.1. WTW and Economic Contagions        19

2.2. Resilience Failures   21

3. TWIC 25

3.1. MSRAM       26

3.2. PROTECT     30

4. Sustainable and Resilient Supply Chains             31

5. Are Supply Chains Secure?      33

5.1. Encapsulation Works             35

5.2. Who Owns the Trusted Path?             36

6. Discussion      37

 

COMMUNICATIONS AND THE INTERNET 2

1. Early Years     5

1.1. The Natural Monopoly          9

1.2. The Communications Act of 1996      12

2. Regulatory Structure 14

2.1. The Most Important Person in Modern History           15

2.2. The First (Modern) Critical Infrastructure      16

3. The Architecture of the Communications Sector            21

3.1. Physical Infrastructure          21

3.2. Wireless Networks 24

3.3. Extra-terrestrial Communication       26

3.4. Land Earth Stations 30

3.5. Cellular Networks   31

3.6. Cell Phone Generations        34

3.7. Wi-Fi Technology     35

4. Risk and Resilience Analysis    37

4.1. Importance of Carrier Hotels              39

4.2. The Submarine Cable Network          41

4.3. HPM Threats             43

4.4. Cellular Network Threats     45

4.5. Physical Threats       49

5. The Monoculture Internet      49

5.1. The Internet Self-organized 52

5.2. The Original Sins      55

5.2.1. The DNS   58

5.2.2. More Original Sin 60

5.3. The Hierarchical Internet     62

5.4. Too Many Open Ports            65

6. Internet Governance 66

6.1. IAB and IETF               67

6.2. ICANN Wars               71

6.3. ISOC              74

6.4. W3C              75

6.5. Internationalization 77

6.6. Regulation and Balkanization              79

6.6.1. Rise of Regulation                81

6.6.2. Criticality of the Internet  83

7.  Green Communications          84

7.1. Solar Computing      84

7.2. Quantum Communications 85

7.3. Adiabatic Logic          86

8. Discussion      87

 

CYBER THREATS 1

1. Threat surface              8

1.1. Script-kiddies            14

1.2. Black Hats   16

1.3. Weaponized Exploits             16

1.4. Ransomware and the NSA   19

2. Basic Vulnerabilities   22

2.1. The First Exploit       25

2.2. TCP/IP Flaws              29

2.3. Open Ports 33

2.4. Buffer Overflow Exploits      35

2.5. DDoS Attacks            37

2.6. Email Exploits            38

2.7. Flawed Application and System Software     39

2.8. Trojans, Worms, Viruses, and Keyloggers      42

2.9. Hacking the DNS      44

2.10. Hardware Flaws     46

2.11. Botnets     49

3. Cyber Risk Analysis     52

3.1. Kill Chain Approach 53

3.2. Machine-learning Approach 55

4. Analysis           57

5. Discussion      59

 

SOCIAL HACKING             1

1. Web 2.0 and the Social Network          5

2. Social Networks Amplify Memes          10

3. Topology Matters       13

4. Computational Propaganda    15

5. Beware the Echo Chamber      18

6. Big Data Analytics        20

6.1. Algorithmic Bias       23

6.2. The Depths of Deep Learning             24

6.3. Data Brokers             25

7. GDPR               26

8. Social Network Resilience        30

9. The Sustainable Web 32

9.1. The Century of Regulation   33

9.2. The NetzDG               34

10. Discussion    37

 

BANKING AND FINANCE 2

1. The Financial System 10

1.1. Federal Reserve vs. US Treasury        12

1.2. Operating the System            13

1.3. Balancing the Balance Sheet               15

1.4. Paradox of Enrichment          18

2. Financial Networks     19

2.1. FedWire      20

2.2. TARGET       22

2.3. SWIFT           24

2.4. Credit Card Networks            26

2.5. 3-D Secure Payment              27

3. Virtual Currency          29

3.1. Intermediary PayPal               30

3.2. ApplePay    31

3.3. Cryptocurrency        32

3.3.1. Nakamoto’s Revenge         34

3.3.2. Double Spend Problem     35

3.3.3. Crypto Challenges               39

4. Hacking a Financial Network  43

5. Hot Money    45

5.1. Liquidity Traps          46

5.2. The Dutch Disease  49

6. The End of Stimulus? 51

7. Fractal Markets            52

7.1. Efficient Market Hypothesis (EMH)  53

7.2. Fractal Market Hypothesis (FMH)     55

7.3. Predicting Collapse 56

8. The Threat is Existential            58

9. Discussion      59

 

STRATEGIES FOR A CHANGING WORLD   1

1. Whole of Government              5

2. Risk and Resilience     8

3. Complex and Emergent CIKR  12

3.1. Communications and IT         13

3.2. Internet and Cybersecurity 15

4. Surveillance Capitalism             17

5. Industrial Control Systems      19

6. Global Pandemics       22

7. Transportation and Supply Chains        23

8. Banking and Finance  25

9. Discussion      27

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책