Critical Information Infrastructures: Resilience and Protection

Critical Information Infrastructures: Resilience and Protection

by Maitland Hyslop (Author)

Synopsis

The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world - including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.

$28.93

Save:$89.60 (76%)

Quantity

1 in stock

More Information

Format: Hardcover
Pages: 277
Edition: illustrated edition
Publisher: Springer
Published: 08 Oct 2007

ISBN 10: 0387718613
ISBN 13: 9780387718613

Media Reviews

From the reviews:

A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government representatives, policy advisors, academic researchers and students of resilience. The work is concise and to the point and allows the reader to familiarize themselves speedily with a number of pressing security issues. The historical points cited are useful with respect to underpinning the key themes covered and the well crafted writing style assists the reader throughout. It can also be stated that the insights and examples drawn from various countries and the public-private sector issues raised are worthy of inclusion. The points made in Chapter 13: A Manifesto for Change, are well argued and should be taken up by policy makers as they are relevant and necessary.

-- CAMIS Newsletter, Volume 3, Number 5, 2007

The book focuses on the protection of critical information infrastructures, and providing for resilience in recovery following successful attacks. ... The book is probably best used in one of two ways: to skim, in order to get a quick overview of the issues and Hyslop's thoughts on solutions ... or to build one's own view by reading and evaluating the arguments and solutions, and then using the references in the bibliography to obtain additional information. (Gordon B. Davis, ACM Computing Reviews, Vol. 49 (12), December, 2008)