| 000 | 03149nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-0-85729-655-9 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083714.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 110622s2011 xxk| s |||| 0|eng d | ||
| 020 |
_a9780857296559 _9978-0-85729-655-9 |
||
| 024 | 7 |
_a10.1007/978-0-85729-655-9 _2doi |
|
| 050 | 4 | _aTA169.7 | |
| 050 | 4 | _aT55-T55.3 | |
| 050 | 4 | _aTA403.6 | |
| 072 | 7 |
_aTGPR _2bicssc |
|
| 072 | 7 |
_aTEC032000 _2bisacsh |
|
| 082 | 0 | 4 |
_a658.56 _223 |
| 100 | 1 |
_aKröger, Wolfgang. _eauthor. |
|
| 245 | 1 | 0 |
_aVulnerable Systems _h[electronic resource] / _cby Wolfgang Kröger, Enrico Zio. |
| 264 | 1 |
_aLondon : _bSpringer London, _c2011. |
|
| 300 |
_aXIV, 204p. 63 illus., 6 illus. in color. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _a1. Introduction and Definition of Key Terms -- 2. Properties of Critical Infrastructures -- 3. Challenges to Methods for the Vulnerability Analysis of Critical Infrastructures -- 4. Basic Approaches -- 5. Conceptual Frameworks for Vulnerability Assessment -- 6. Methods of Analysis -- 7. Concluding Considerations. | |
| 520 | _aThe safe management of the complex distributed systems and critical infrastructures which constitute the backbone of modern industry and society entails identifying and quantifying their vulnerabilities to design adequate protection, mitigation, and emergency action against failure. In practice, there is no fail-safe solution to such problems and various frameworks are being proposed to effectively integrate different methods of complex systems analysis in a problem-driven approach to their solution. Vulnerable Systems reflects the current state of knowledge on the procedures which are being put forward for the risk and vulnerability analysis of critical infrastructures. Classical methods of reliability and risk analysis, as well as new paradigms based on network and systems theory, including simulation, are considered in a dynamic and holistic way. Readers of Vulnerable Systems will benefit from its structured presentation of the current knowledge base on this subject. It will enable graduate students, researchers and safety and risk analysts to understand the methods suitable for different phases of analysis and to identify their criticalities in application. | ||
| 650 | 0 | _aEngineering. | |
| 650 | 0 | _aPhysics. | |
| 650 | 0 | _aSystem safety. | |
| 650 | 0 | _aTelecommunication. | |
| 650 | 0 | _aProduction of electric energy or power. | |
| 650 | 1 | 4 | _aEngineering. |
| 650 | 2 | 4 | _aQuality Control, Reliability, Safety and Risk. |
| 650 | 2 | 4 | _aComplexity. |
| 650 | 2 | 4 | _aPower Electronics, Electrical Machines and Networks. |
| 650 | 2 | 4 | _aCommunications Engineering, Networks. |
| 700 | 1 |
_aZio, Enrico. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780857296542 |
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-0-85729-655-9 |
| 912 | _aZDB-2-ENG | ||
| 999 |
_c105250 _d105250 |
||