Vulnerable Systems [recurso electrónico] / by Wolfgang Kröger, Enrico Zio.

Por: Kröger, Wolfgang [author.]Colaborador(es): Zio, Enrico [author.] | SpringerLink (Online service)Tipo de material: TextoTextoEditor: London : Springer London, 2011Descripción: XIV, 204 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9780857296559Tema(s): Engineering | Physics | System safety | Telecommunication | Production of electric energy or power | Engineering | Quality Control, Reliability, Safety and Risk | Complexity | Power Electronics, Electrical Machines and Networks | Communications Engineering, NetworksFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 658.56 Clasificación LoC:TA169.7T55-T55.3TA403.6Recursos en línea: Libro electrónicoTexto
Contenidos:
1. Introduction and Definition of Key Terms -- 2. Properties of Critical Infrastructures -- 3. Challenges to Methods for the Vulnerability Analysis of Critical Infrastructures -- 4. Basic Approaches -- 5. Conceptual Frameworks for Vulnerability Assessment -- 6. Methods of Analysis -- 7. Concluding Considerations.
En: Springer eBooksResumen: The safe management of the complex distributed systems and critical infrastructures which constitute the backbone of modern industry and society entails identifying and quantifying their vulnerabilities to design adequate protection, mitigation, and emergency action against failure. In practice, there is no fail-safe solution to such problems and various frameworks are being proposed to effectively integrate different methods of complex systems analysis in a problem-driven approach to their solution.   Vulnerable Systems reflects the current state of knowledge on the procedures which are being put forward for the risk and vulnerability analysis of critical infrastructures. Classical methods of reliability and risk analysis, as well as new paradigms based on network and systems theory, including simulation, are considered in a dynamic and holistic way.   Readers of Vulnerable Systems will benefit from its structured presentation of the current knowledge base on this subject. It will enable graduate students, researchers and safety and risk analysts to understand the methods suitable for different phases of analysis and to identify their criticalities in application.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos TA169.7 (Browse shelf(Abre debajo)) 1 No para préstamo 370608-2001

1. Introduction and Definition of Key Terms -- 2. Properties of Critical Infrastructures -- 3. Challenges to Methods for the Vulnerability Analysis of Critical Infrastructures -- 4. Basic Approaches -- 5. Conceptual Frameworks for Vulnerability Assessment -- 6. Methods of Analysis -- 7. Concluding Considerations.

The safe management of the complex distributed systems and critical infrastructures which constitute the backbone of modern industry and society entails identifying and quantifying their vulnerabilities to design adequate protection, mitigation, and emergency action against failure. In practice, there is no fail-safe solution to such problems and various frameworks are being proposed to effectively integrate different methods of complex systems analysis in a problem-driven approach to their solution.   Vulnerable Systems reflects the current state of knowledge on the procedures which are being put forward for the risk and vulnerability analysis of critical infrastructures. Classical methods of reliability and risk analysis, as well as new paradigms based on network and systems theory, including simulation, are considered in a dynamic and holistic way.   Readers of Vulnerable Systems will benefit from its structured presentation of the current knowledge base on this subject. It will enable graduate students, researchers and safety and risk analysts to understand the methods suitable for different phases of analysis and to identify their criticalities in application.

19

Con tecnología Koha