-
1
-
-
85017342093
-
-
Critical nodes will be synonymous with hubs, in this book
-
Critical nodes will be synonymous with hubs, in this book.
-
-
-
-
2
-
-
0003994024
-
Critical Foundations: Protecting America's Infrastructures
-
The Report of the President's Commission on Critical Infrastructure Protection, October
-
Critical Foundations: Protecting America's Infrastructures," The Report of the President's Commission on Critical Infrastructure Protection, October 1997.
-
(1997)
-
-
-
3
-
-
0003845128
-
Exploring Corporate Strategy: Text and Cases
-
Englewood Cliffs, NJ, Prentice-Hall
-
G. Johnson and K. Scholes, Exploring Corporate Strategy: Text and Cases. Englewood Cliffs, NJ:Prentice-Hall, 2001.
-
(2001)
-
-
Johnson, G.1
Scholes, K.2
-
4
-
-
85017401406
-
There is currently no definition of homeland defense. The proposed definition shows the Army's mission to protect our territory, population, and critical infrastructure by; deterring/defending against foreign and domestic threats, supporting civil authorities for crisis and consequence management, and helping to ensure the continuance [of] critical national assets
-
At the time of this writing, homeland defense was undergoing revision. In an Army document dated April, the term was described as follows
-
At the time of this writing, homeland defense was undergoing revision. In an Army document dated April 1999, the term was described as follows: "There is currently no definition of homeland defense. The proposed definition shows the Army's mission to protect our territory, population, and critical infrastructure by; deterring/defending against foreign and domestic threats, supporting civil authorities for crisis and consequence management, and helping to ensure the continuance [of] critical national assets."http://www.fas.org/spp/starwars/program/homeland/executive-overview.htm.
-
(1999)
-
-
-
5
-
-
85017402516
-
-
The enclosed disk includes several simulation programs that demonstrate the concepts described here
-
The enclosed disk includes several simulation programs that demonstrate the concepts described here.
-
-
-
-
6
-
-
85017396041
-
The Whitehouse: Homeland Security Presidential Directive/HSPD-7
-
December 17
-
The Whitehouse: Homeland Security Presidential Directive/HSPD-7, December 17, 2003.
-
(2003)
-
-
-
7
-
-
85017397055
-
The "most popular" or "busiest" Internet servers are easily found by a variety of methods, not the least of which are "crawlers" or "spiders"
-
software programs that travel through the Internet on their own and report back on what they find
-
The "most popular" or "busiest" Internet servers are easily found by a variety of methods, not the least of which are "crawlers" or "spiders"software programs that travel through the Internet on their own and report back on what they find.
-
-
-
-
8
-
-
85017332238
-
-
http://www.ncs.gov/about.html.
-
-
-
-
9
-
-
85017334197
-
-
http://www.archives.gov/federal_register/codification/executive_order/12148.html.
-
-
-
-
10
-
-
85017388336
-
-
http://www.religioustolerance.org/rajneesh.htm.
-
-
-
-
11
-
-
85017369367
-
The group settled on the 65,000 acre 'Big Muddy Ranch' near Antelope, Oregon, which his sannyasins had bought for six million dollars. The ranch was renamed Rajneeshpuram ("Essence of Rajneesh")
-
This 'small, desolate valley twelve miles from Antelope, Oregon was transformed into a thriving town of 3,000 residents, with a 4,500 foot paved airstrip, a 44 acre reservoir, an 88,000 square foot meeting hall '"
-
"The group settled on the 65,000 acre 'Big Muddy Ranch' near Antelope, Oregon, which his sannyasins had bought for six million dollars. The ranch was renamed Rajneeshpuram ("Essence of Rajneesh").This 'small, desolate valley twelve miles from Antelope, Oregon was transformed into a thriving town of 3,000 residents, with a 4,500 foot paved airstrip, a 44 acre reservoir, an 88,000 square foot meeting hall '" http://www.clui.org/clui_4_1/lotl/lotlv10/rajneesh.html.
-
-
-
-
12
-
-
85017331663
-
-
http://home.att.net/meditation/bioterrorist.html.
-
-
-
-
13
-
-
85017403777
-
-
http://www.fas.org/irp/offdocs/pdd39.htm.
-
-
-
-
14
-
-
0003994024
-
Critical Foundations: Protecting America's Infrastructures
-
The Report of the President's Commission on Critical Infrastructure Protection, October
-
"Critical Foundations: Protecting America's Infrastructures," The Report of the President's Commission on Critical Infrastructure Protection, October 1997.
-
(1997)
-
-
-
15
-
-
85017375855
-
-
http://www.fas.org/irp/offdocs/eo13010.htm.
-
-
-
-
16
-
-
85017352924
-
-
http://www.fas.org/irp/offdocs/pdd/pdd-63.htm.
-
-
-
-
17
-
-
85017392116
-
-
http://www.archives.gov/federal_register/executive_orders/1999.html#13130.
-
-
-
-
18
-
-
0141915841
-
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
-
February, Department of Homeland Security
-
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, February 2003, Department of Homeland Security. http://www.whitehouse.gov/pcipb/physical.html.
-
(2003)
-
-
-
19
-
-
85017380381
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
-
December 17
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003.
-
(2003)
-
-
-
20
-
-
85017380381
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
-
December 17
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003
-
(2003)
-
-
-
21
-
-
85017380381
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
-
December 17
-
The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003
-
(2003)
-
-
-
22
-
-
85017379234
-
San Lewis Rey is a virtual city in cyber-space where all bad things happen
-
It is a pedagogical device for exercising the reader's ability to apply what he or she has learned from the text
-
San Lewis Rey is a virtual city in cyber-space where all bad things happen. It is a pedagogical device for exercising the reader's ability to apply what he or she has learned from the text.
-
-
-
-
23
-
-
0141915841
-
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
-
Feb
-
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, Feb. 2003,p. 9.
-
(2003)
, pp. 9
-
-
-
24
-
-
85017339192
-
-
http://www.archives.gov/federal_register/codification/executive_order/12656.html.
-
-
-
-
25
-
-
0009032943
-
Disaster Assistance: Federal, State, and Local Responses to Natural Disasters Need Improvement
-
T-RCED-91-57, May 15
-
http://www.gao.gov Disaster Assistance: Federal, State, and Local Responses to Natural Disasters Need Improvement, T-RCED-91-57, May 15, 1991.
-
(1991)
-
-
-
26
-
-
85017399550
-
-
http://www.fas.org/irp/offdocs/pdd39.htm.
-
-
-
-
27
-
-
0347924440
-
Problems of Preparedness
-
Paper 2000-28, Belfer Center, Harvard University,December
-
Richard A. Falkenrath "Problems of Preparedness" Paper 2000-28, Belfer Center, Harvard University,December 2000.
-
(2000)
-
-
Falkenrath, R.A.1
-
28
-
-
85017332809
-
-
Leadership, Hyperion Books, New York
-
R. W. Giuliani, Leadership, Hyperion Books, New York, 2002, pp. 14-15.
-
(2002)
, pp. 14-15
-
-
Giuliani, R.W.1
-
29
-
-
84883916747
-
The Internet Under Crisis Conditions
-
Learning from September 11, National Research Council,National Academies Press, Washington, D.C.
-
The Internet Under Crisis Conditions: Learning from September 11, National Research Council,National Academies Press, Washington, D.C., 2001, p. 1.
-
(2001)
, pp. 1
-
-
-
30
-
-
84883916747
-
The Internet Under Crisis Conditions
-
Learning from September 11, National Research Council,National Academies Press, Washington, D.C.
-
The Internet Under Crisis Conditions: Learning from September 11, National Research Council,National Academies Press, Washington, D.C., 2001, p. 8; p. 25.
-
(2001)
-
-
-
31
-
-
85017401900
-
-
One can argue that the only reliable methodology is foolproof intelligence, which is an oxymoron
-
One can argue that the only reliable methodology is foolproof intelligence, which is an oxymoron.
-
-
-
-
32
-
-
0012355752
-
Topics in Operations Research: Predicting Combat Effects
-
Military Applications Society, INFORMS
-
D.S. Hartley, "Topics in Operations Research: Predicting Combat Effects," Military Applications Society, INFORMS, informs@informs.org, 2001.
-
(2001)
-
-
Hartley, D.S.1
-
33
-
-
0141915841
-
National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
-
February
-
National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, February 2003.
-
(2003)
-
-
-
34
-
-
85017387423
-
-
html#Critical Infrastructure Information Sharing and Analysis Centers
-
http://www.ciao.gov/related/index.html#Critical Infrastructure Information Sharing and Analysis Centers.
-
-
-
-
35
-
-
85017385501
-
-
http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.5005
-
-
-
-
36
-
-
85017351308
-
-
http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.5005
-
-
-
-
37
-
-
85017379080
-
-
Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life, PLUME Cambridge Center, Cambridge, MA, 02142
-
A.-L. Barabasi, Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life, PLUME Cambridge Center, Cambridge, MA, 02142, 2003.
-
(2003)
-
-
Barabasi, A.-L.1
-
38
-
-
85017354944
-
-
Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds. MIT Press, Cambridge, MA
-
M. Resnick, Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds. MIT Press, Cambridge, MA, 1994.
-
(1994)
-
-
Resnick, M.1
-
39
-
-
85017356072
-
-
Termite is available from the website or the disk accompanying this book
-
Termite is available from the website or the disk accompanying this book.
-
-
-
-
40
-
-
85017407263
-
-
The Second Law of Thermodynamics says entropy always increases whenever a physical process takes place. Hence, order tends to disorder-not the opposite
-
The Second Law of Thermodynamics says entropy always increases whenever a physical process takes place. Hence, order tends to disorder-not the opposite.
-
-
-
-
41
-
-
85017398999
-
The term "scale free"
-
does not refer to the size nor the breadth of the network. Instead, scale-free networks obey a power law that has no variance, and the links are distributed according to a probability density function that is proportional to (1/k)p, where p is typically between 2 and 3
-
The term "scale free" does not refer to the size nor the breadth of the network. Instead, scale-free networks obey a power law that has no variance, and the links are distributed according to a probability density function that is proportional to (1/k)p, where p is typically between 2 and 3.
-
-
-
-
42
-
-
85017392864
-
-
Barabasi and others define a scale-free network as one with a power law p between 2 and 3. However, for our purposes, any value of p greater than 1.0 will do
-
Barabasi and others define a scale-free network as one with a power law p between 2 and 3. However, for our purposes, any value of p greater than 1.0 will do.
-
-
-
-
43
-
-
85017375278
-
-
PowerGraph.class and PowerGraph.html can be found on the disk and the website under
-
PowerGraph.class and PowerGraph.html can be found on the disk and the website under Scale-Free Demo.
-
Scale-Free Demo
-
-
-
44
-
-
85017343758
-
-
The Poisson distribution is a discrete probability distribution for X, where X takes on the values X 1/4 0,1,2,3,Its shape is determined by one parameter l, which is the expected value of X. If the average number of random occurrences per interval 1/4 l, the probability P of X occurrences in the interval is P(X) 1/4 el[lX/X!]
-
The Poisson distribution is a discrete probability distribution for X, where X takes on the values X 1/4 0,1,2,3,Its shape is determined by one parameter l, which is the expected value of X. If the average number of random occurrences per interval 1/4 l, the probability P of X occurrences in the interval is P(X) 1/4 el[lX/X!].
-
-
-
-
45
-
-
85017398087
-
-
Metcalf's Law states that the value of a network increases proportional to the square of the number of users
-
Metcalf's Law states that the value of a network increases proportional to the square of the number of users.
-
-
-
-
46
-
-
85017385758
-
The Road Atlas Deluxe
-
Only one and two digit interstate routes were counted-three-digit routes are beltway or spur roads in the system
-
The Road Atlas Deluxe, RAND McNally: United States, Canada, and Mexico, 2003. Only one and two digit interstate routes were counted-three-digit routes are beltway or spur roads in the system.
-
(2003)
RAND McNally: United States, Canada, and Mexico
-
-
-
47
-
-
0033196289
-
Networks, Dynamics, and the Small-World Phenomenon
-
Sept
-
D.Watts, "Networks, Dynamics, and the Small-World Phenomenon," American Journal of Sociology,vol. 105, no. 2, pp. 493-527, Sept. 1999.
-
(1999)
American Journal of Sociology
, vol.105
, Issue.2
, pp. 493-527
-
-
Watts, D.1
-
49
-
-
41349118476
-
Halting viruses in scale-free networks
-
May
-
Z. Dezso and A.-L. Barabasi, "Halting viruses in scale-free networks," Physical Review E, vol. 65,p. 055103-(R), May 2002.
-
(2002)
Physical Review E
, vol.65
, pp. 055103
-
-
Dezso, Z.1
Barabasi, A.-L.2
-
50
-
-
85017331261
-
-
CascadeNet.jar and CascadeNet.html can be found on the website or accompanying disk
-
CascadeNet.jar and CascadeNet.html can be found on the website or accompanying disk.
-
-
-
-
51
-
-
85017402176
-
-
http://www.paretolaw.co.uk/principle.html
-
-
-
-
52
-
-
85017378147
-
-
San Lewis Rey is a virtual city in cyber-space where all bad things happen
-
San Lewis Rey is a virtual city in cyber-space where all bad things happen.
-
-
-
-
53
-
-
85017359040
-
-
a.k.a RGB.html",4>RGB.html, is available on the website or the accompanying disk
-
Program TreeLink, a.k.a RGB.html",4>RGB.html, is available on the website or the accompanying disk
-
Program TreeLink
-
-
-
54
-
-
85017351492
-
Boolean variables A and B can take on only one of two values: true or false
-
Named after, Ireland
-
Named after George Boole, 1815-1864, Ireland. Boolean variables A and B can take on only one of two values: true or false.
-
-
-
Boole, G.1
-
55
-
-
85017399827
-
partial truth
-
that is, a number between zero (FALSE) and 1.0 (TRUE),which measures the level of certainty that an event will occur. A probability of 50% means we are equally uncertain as to whether an event will occur. A probability of 25% means we are relatively sure that an event will not occur
-
We interpret probability as a "partial truth," that is, a number between zero (FALSE) and 1.0 (TRUE),which measures the level of certainty that an event will occur. A probability of 50% means we are equally uncertain as to whether an event will occur. A probability of 25% means we are relatively sure that an event will not occur.
-
We interpret probability as a
-
-
-
56
-
-
85017357933
-
-
OK, so it is not so amusing when your bank account is overdrawn, but this real-world example serves to illustrate subtleties in even simple systems
-
OK, so it is not so amusing when your bank account is overdrawn, but this real-world example serves to illustrate subtleties in even simple systems.
-
-
-
-
57
-
-
85017384280
-
-
It is not necessary to perform manual calculations as done here. Program FTplus.html (FT.jar) computes event tree events automatically
-
It is not necessary to perform manual calculations as done here. Program FTplus.html (FT.jar) computes event tree events automatically.
-
-
-
-
58
-
-
85017376267
-
-
A truth table could be used instead. An event tree was chosen because it is visual-the reader can see all possible events produced by assuming each fault is alternately true and then false
-
A truth table could be used instead. An event tree was chosen because it is visual-the reader can see all possible events produced by assuming each fault is alternately true and then false.
-
-
-
-
59
-
-
85017369253
-
-
A combination event is an event made up of a single, double, or triple event all at the same time
-
A combination event is an event made up of a single, double, or triple event all at the same time.
-
-
-
-
60
-
-
85017382848
-
-
Perhaps now the reader realizes that a combination event is simply a single, double, triple, and so on combination of one, two, three, and so on threats
-
Perhaps now the reader realizes that a combination event is simply a single, double, triple, and so on combination of one, two, three, and so on threats.
-
-
-
-
61
-
-
85017381063
-
-
An OR-tree is a tree with one OR gate connecting k threats to the root of the fault tree
-
An OR-tree is a tree with one OR gate connecting k threats to the root of the fault tree.
-
-
-
-
62
-
-
85017350838
-
-
An AND-tree is a tree with one AND gate connecting k threats to the root of the fault tree
-
An AND-tree is a tree with one AND gate connecting k threats to the root of the fault tree.
-
-
-
-
63
-
-
85017406979
-
-
Program, a.k.a FT.jar, described in Chapter 6, does much of the arithmetic needed to handle fault and event trees, which makes it possible to analyze fault/event trees containing thousands of events
-
Program FTplus.html, a.k.a FT.jar, described in Chapter 6, does much of the arithmetic needed to handle fault and event trees, which makes it possible to analyze fault/event trees containing thousands of events.
-
-
-
-
64
-
-
85017345307
-
Leonhard Euler and the Koenigsberg Bridges
-
Scientific American, July1953
-
Sisma, Pavel, "Leonhard Euler and the Koenigsberg Bridges," Scientific American, pp. 66-70, July1953. http://mathforum.org/epigone/math-history-list/skodwendjerm
-
-
-
Sisma, P.1
-
65
-
-
85017381792
-
-
We will come back to this later: Isolated nodes and nodes of degree one are shown to have little impact on the resulting investment strategy
-
We will come back to this later: Isolated nodes and nodes of degree one are shown to have little impact on the resulting investment strategy.
-
-
-
-
66
-
-
85017388918
-
-
These definitions will change for fault trees, because of AND/OR logic in the fault tree model
-
These definitions will change for fault trees, because of AND/OR logic in the fault tree model.
-
-
-
-
67
-
-
85017335794
-
-
In the case of a node with degree of one (a terminal node, for example), the amount of damage caused by its removal is less than the removal of its link, so the single-degreed node will lose points to its link
-
In the case of a node with degree of one (a terminal node, for example), the amount of damage caused by its removal is less than the removal of its link, so the single-degreed node will lose points to its link.
-
-
-
-
68
-
-
85017345437
-
-
Network Analysis also performs flow analysis, but this topic will not be covered here. See the Network Analysis User Guide for descriptions of other Network Analysis features
-
Network Analysis also performs flow analysis, but this topic will not be covered here. See the Network Analysis User Guide for descriptions of other Network Analysis features.
-
-
-
-
69
-
-
85017377874
-
-
NA.jar is the desktop version, the Web version. NA.jar can save and open local disk files, but, cannot
-
NA.jar is the desktop version, NetworkAnalysis.html the Web version. NA.jar can save and open local disk files, but NetworkAnalysis.html cannot.
-
-
-
-
70
-
-
85017339217
-
-
The users manual for NetworkAnalysis has many more details than provided here
-
The users manual for NetworkAnalysis has many more details than provided here.
-
-
-
-
71
-
-
85017388107
-
-
These examples can be found in the NetworkAnalysis software provided along with this book
-
These examples can be found in the NetworkAnalysis software provided along with this book.
-
-
-
-
72
-
-
85017349330
-
-
WASA is an example in the FTplus examples menu
-
WASA is an example in the FTplus examples menu.
-
-
-
-
73
-
-
85017380641
-
-
Small-world networks will contain critical clusters-neighborhoods of nodes that are critical
-
Small-world networks will contain critical clusters-neighborhoods of nodes that are critical.
-
-
-
-
74
-
-
85017332701
-
-
This simplification is an approximation of reality, because we know it is more costly to eliminate the last 1% of vulnerability than the first 1%
-
This simplification is an approximation of reality, because we know it is more costly to eliminate the last 1% of vulnerability than the first 1%.
-
-
-
-
75
-
-
85017342554
-
-
As mentioned, this may not be a valid assumption, but it is a simplification
-
As mentioned, this may not be a valid assumption, but it is a simplification.
-
-
-
-
76
-
-
85017391518
-
-
The program, incorporates the optimal risk reduction technique described here
-
The program FTplus incorporates the optimal risk reduction technique described here.
-
FTplus
-
-
-
77
-
-
85017333920
-
-
Emergence is a random process, so the answer may vary from application to application. In this case,the author obtained an allocation of $1, $49, $2, and $48
-
Emergence is a random process, so the answer may vary from application to application. In this case,the author obtained an allocation of $1, $49, $2, and $48.
-
-
-
-
78
-
-
85017338863
-
-
Of course we could also solve this problem using emergence, but whenever possible it is desirable to obtain a closed-form solution. Computers are fast and cheap, but humans are still more clever
-
Of course we could also solve this problem using emergence, but whenever possible it is desirable to obtain a closed-form solution. Computers are fast and cheap, but humans are still more clever.
-
-
-
-
79
-
-
85017370776
-
-
FTplus-also known as FT.jar-runs on the Web as FTplus and on the desktop as FT.jar
-
FTplus-also known as FT.jar-runs on the Web as FTplus and on the desktop as FT.jar.
-
-
-
-
80
-
-
85017375162
-
-
Details of how to use FTplus and FT.jar are provided in the operations manual
-
Details of how to use FTplus and FT.jar are provided in the operations manual.
-
-
-
-
81
-
-
85017394601
-
CARVER and Port Security Risk Assessment Tool (PSRAT)
-
two examples that use some kind of ranking to determine which vulnerability or risk is greatest
-
CARVER and Port Security Risk Assessment Tool (PSRAT) two examples that use some kind of ranking to determine which vulnerability or risk is greatest.
-
-
-
-
82
-
-
85017381563
-
Sharp corners
-
a result of functions with p1(12 p2)(12p3) terms, which when minimized tends to drive p1 to zero and p2, p3 to one. This causes the volume defined by p1(1 2p2)(12p3) to have "many zeros"-all indistinguishable from one another
-
"Sharp corners" a result of functions with p1(12 p2)(12p3) terms, which when minimized tends to drive p1 to zero and p2, p3 to one. This causes the volume defined by p1(1 2p2)(12p3) to have "many zeros"-all indistinguishable from one another.
-
-
-
-
83
-
-
0003409648
-
25 Years of the Safe Drinking Water Act: History and Trends
-
EPA 816-R-99-007, December
-
"25 Years of the Safe Drinking Water Act: History and Trends," EPA 816-R-99-007, December 1999, http://www.epa.gov/safewater/consumer/trendrpt.pdf
-
(1999)
-
-
-
84
-
-
0003446974
-
Understanding the Safe Drinking Water Act
-
December, EPA 810-F-99-008. The EPA's Office of Ground Water and Drinking Water, website
-
Understanding the Safe Drinking Water Act, December 1999, EPA 810-F-99-008. The EPA's Office of Ground Water and Drinking Water, website: http://www.epa.gov/safewater/
-
(1999)
-
-
-
85
-
-
85017343036
-
-
http://www.fda.gov/oc/bioterrorism/PL107-188.html#title4
-
-
-
-
86
-
-
85017400716
-
-
I Street, NW, Suite 500, 20006
-
http://www.WaterISAC.org, 1620 I Street, NW, Suite 500, Washington, D.C. 20006.
-
(1620)
-
-
Washington, D.C.1
-
87
-
-
85017400323
-
-
The October 17, Loma Prieta Earthquake
-
The October 17, 1989 Loma Prieta Earthquake, http://www.sfmuseum.net/alm/quakes3.html#1989
-
(1989)
-
-
-
88
-
-
85017386684
-
-
Memorandum to Tom Elzey, PUC General Manager from Art Jensen, Acting General Manager, November 21, Museum of the City of San Francisco
-
Memorandum to Tom Elzey, PUC General Manager from Art Jensen, Acting General Manager, November 21, 1989. Museum of the City of San Francisco.
-
(1989)
-
-
-
89
-
-
85017389220
-
-
http://Sfwater.org
-
-
-
-
90
-
-
85017358002
-
-
Another network could be constructed that models the interdependencies of water, power, and agriculture,but we resist the temptation here
-
Another network could be constructed that models the interdependencies of water, power, and agriculture,but we resist the temptation here.
-
-
-
-
91
-
-
84887311810
-
Hetch Hetchy Water and the Bay Area Economy
-
Bay Area Economic Forum, October
-
"Hetch Hetchy Water and the Bay Area Economy," Bay Area Economic Forum, October 2002, http://www.bayeconfor.org/baefinfrastruct.htm
-
(2002)
-
-
-
92
-
-
85017394860
-
-
Strictly speaking, the exponent should lie between 2 and 3, but we do not need to be mathematically rigorous. Our purpose is to identify the most connected nodes
-
Strictly speaking, the exponent should lie between 2 and 3, but we do not need to be mathematically rigorous. Our purpose is to identify the most connected nodes.
-
-
-
-
93
-
-
84887311810
-
Hetch Hetchy Water and the Bay Area Economy
-
Bay Area Economic Forum, October
-
"Hetch Hetchy Water and the Bay Area Economy," Bay Area Economic Forum, October 2002, http://www.bayeconfor.org/baefinfrastruct.htm
-
(2002)
-
-
-
94
-
-
85017391980
-
Cryptosporidium: A Drinking Water Supply Problem
-
Water Resources Research Institute of the University of North Carolina. Special Report No. 12, November
-
Robert E. Holman, "Cryptosporidium: A Drinking Water Supply Problem," Water Resources Research Institute of the University of North Carolina. Special Report No. 12, November 1993.
-
(1993)
-
-
Holman, R.E.1
-
95
-
-
0038699574
-
Cost of Illness in the 1993 Waterborne Cryptosporidium Outbreak, Milwaukee, Wisconsin
-
April
-
Phaedra S. Corso, Michael H. Kramer, Kathleen A. Blair, David G. Addiss, Jeffrey P. Davis, and Anne C. Haddix, "Cost of Illness in the 1993 Waterborne Cryptosporidium Outbreak, Milwaukee, Wisconsin,"Emerging Infectious Diseases, vol. 9, no. 4, April 2003.
-
(2003)
Emerging Infectious Diseases
, vol.9
, Issue.4
-
-
Corso, P.S.1
Kramer, M.H.2
Blair, K.A.3
Addiss, D.G.4
Davis, J.P.5
Haddix, A.C.6
-
96
-
-
85017357270
-
-
is available on the disk accompanying this book and on the course website
-
Program FTplus, a.k.a. FT.jar, is available on the disk accompanying this book and on the course website.
-
Program FTplus, a.k.a. FT.jar
-
-
-
97
-
-
0011015077
-
Inviting Disaster: Lessons From the Edge of Technology
-
HarperBusiness, 2001
-
J. R. Chiles, "Inviting Disaster: Lessons From the Edge of Technology," HarperBusiness, 2001, 2002.http://www.invitingdisaster.com
-
(2002)
-
-
Chiles, J.R.1
-
98
-
-
85017339744
-
-
http://www.sss-mag.com/glossary/page4.html
-
-
-
-
99
-
-
85017394237
-
-
Personal communication with Joe Weiss, April
-
Personal communication with Joe Weiss, April 2005.
-
(2005)
-
-
-
100
-
-
85017380487
-
-
http://niap.nist.gov/
-
-
-
-
101
-
-
85017371008
-
-
http://www.it-isac.org/
-
-
-
-
102
-
-
85017360495
-
-
ARC Advisory Group, http://www.ARCweb.com
-
-
-
-
103
-
-
85017401311
-
-
Newton-Evans Research, Baltimore, MD
-
Newton-Evans Research, Baltimore, MD, http://www.newton-evans.com
-
-
-
-
104
-
-
85017352821
-
-
Only the apportioned risk reduction strategy is reported here. The others are left as an exercise for the reader
-
Only the apportioned risk reduction strategy is reported here. The others are left as an exercise for the reader.
-
-
-
-
105
-
-
85017401869
-
-
A firewall is a computer that filters or blocks input and output data ports, thus restricting user access to a network or subnetwork
-
A firewall is a computer that filters or blocks input and output data ports, thus restricting user access to a network or subnetwork.
-
-
-
-
106
-
-
85017398325
-
-
In general we do not know the extent of damage that might be inflicted by a successful cyber-attack on some SCADA system
-
In general we do not know the extent of damage that might be inflicted by a successful cyber-attack on some SCADA system.
-
-
-
-
107
-
-
85017389810
-
-
Personal communication with Joe Weiss, April
-
Personal communication with Joe Weiss, April 2005.
-
(2005)
-
-
-
108
-
-
85017391247
-
-
1/4 0&p 1/4 3629
-
http://www.utc.org/?v2_group 1/4 0&p 1/4 3629.
-
-
-
-
109
-
-
85017405368
-
-
http://www.neuronet.pitt.edu/bogdan/tesla/bio.htm
-
-
-
-
110
-
-
85017395428
-
-
http://www.ferc.gov/
-
-
-
-
111
-
-
0000561160
-
Reengineering the Electric Grid
-
May-June
-
T. Overbye, "Reengineering the Electric Grid," American Scientist, 88, 3, p. 220, May-June 2000.
-
(2000)
American Scientist
, vol.88
, Issue.3
, pp. 220
-
-
Overbye, T.1
-
112
-
-
0038852461
-
-
Two Lectures on the Checks to Population, Oxford Univ. Press, Oxford, England, 1833,reprinted (in part) in Population, Evolution, and Birth Control, G. Hardin, Ed., Freeman, San Francisco
-
W. F. Lloyd, Two Lectures on the Checks to Population, Oxford Univ. Press, Oxford, England, 1833,reprinted (in part) in Population, Evolution, and Birth Control, G. Hardin, Ed., Freeman, San Francisco,1964, p. 37.
-
(1964)
, pp. 37
-
-
Lloyd, W.F.1
-
113
-
-
0014413249
-
The Tragedy of the Commons
-
SCIENCE, December
-
G. Hardin, "The Tragedy of the Commons," SCIENCE, Vol. 162, 13, December 1968, http://www.sciencemag.org
-
(1968)
, vol.162
, Issue.13
-
-
Hardin, G.1
-
114
-
-
3042585477
-
Interim Report: Causes of the August 14th Blackout in the United States and Canada
-
U.S.-Canada Power System Outage Task Force, November
-
U.S.-Canada Power System Outage Task Force, "Interim Report: Causes of the August 14th Blackout in the United States and Canada," November 2003.
-
(2003)
-
-
-
115
-
-
85017360176
-
-
http://www.esisac.com
-
-
-
-
116
-
-
85017402094
-
-
To see an animation of real-time flow of electricity in the Eastern Power Grid, visit
-
To see an animation of real-time flow of electricity in the Eastern Power Grid, visit http://powerworld.com/Java/Eastern
-
-
-
-
117
-
-
85017407099
-
-
Not always: It depends on the number and connectivity of the transmission links!
-
Not always: It depends on the number and connectivity of the transmission links!
-
-
-
-
118
-
-
85017339467
-
-
Sometimes SCALE-ON must take from one generator to give to another, which may not be possible when MAX-ON is set
-
Sometimes SCALE-ON must take from one generator to give to another, which may not be possible when MAX-ON is set.
-
-
-
-
119
-
-
0035826155
-
Exploring Complex Networks
-
NATURE, March
-
S.H. Strogatz, "Exploring Complex Networks," NATURE, vol. 410, March 2001, http://www.nature.com
-
(2001)
, vol.410
-
-
Strogatz, S.H.1
-
120
-
-
85017369695
-
-
Chapter 6 defines availability as (1 2p), where p is the fault probability associated with a vulnerability
-
Chapter 6 defines availability as (1 2p), where p is the fault probability associated with a vulnerability.
-
-
-
-
121
-
-
85017379481
-
-
The program RNet is available from the disk or the website
-
The program RNet is available from the disk or the website.
-
-
-
-
122
-
-
4444365340
-
Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life
-
PLUME
-
A.-L. Barabasi, "Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life," PLUME, p. 119, 2003.
-
(2003)
, pp. 119
-
-
Barabasi, A.-L.1
-
123
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
NATURE, June
-
D.J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," NATURE, 393, June 1998.
-
(1998)
, pp. 393
-
-
Watts, D.J.1
Strogatz, S.H.2
-
124
-
-
85017337265
-
-
CS 3660 projects, Summer
-
CS 3660 projects, Summer 2002.
-
(2002)
-
-
-
125
-
-
85017400360
-
-
This analysis follows from the event matrix discussion in Chapter 5
-
This analysis follows from the event matrix discussion in Chapter 5.
-
-
-
-
126
-
-
85017359649
-
missing
-
The, outcomes account for another 10% vulnerability
-
The "missing" outcomes account for another 10% vulnerability.
-
-
-
-
127
-
-
85017389143
-
-
Actually, the results in Figure 9.13 were obtained from a magnified version of Figure 9.4
-
Actually, the results in Figure 9.13 were obtained from a magnified version of Figure 9.4.
-
-
-
-
128
-
-
3042585477
-
Interim Report: Causes of the August 14th Blackout in the United States and Canada
-
November, U.S.-Canada Power System Outage Task Force
-
"Interim Report: Causes of the August 14th Blackout in the United States and Canada." November 2003, U.S.-Canada Power System Outage Task Force.
-
(2003)
-
-
-
129
-
-
4644267563
-
Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations
-
April, U.S.-Canada Power System Outage Task Force, dated January 12, 2004
-
"Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004. U.S.-Canada Power System Outage Task Force, p. 12 (dated January 12, 2004).https://reports.energy.gov
-
(2004)
, pp. 12
-
-
-
130
-
-
85017331606
-
-
http://www.aep.com
-
-
-
-
131
-
-
85017340226
-
-
http://www.firstenergycorp.com
-
-
-
-
132
-
-
85017357743
-
-
http://www.spectrum.ieee.org/WEBONLY/special/aug03/tline.html
-
-
-
-
133
-
-
0006250961
-
Power and Light: Electricity in the U.S. Energy Infrastructure 1870-1940
-
Corporation for National Research Initiatives
-
A. Friedlander, "Power and Light: Electricity in the U.S. Energy Infrastructure 1870-1940," Corporation for National Research Initiatives, 1996, p. 51. request@cnri.reston.va.us
-
(1996)
, pp. 51
-
-
Friedlander, A.1
-
134
-
-
85017401126
-
-
Personal communication with Joe Weiss
-
Personal communication with Joe Weiss.
-
-
-
-
135
-
-
85017334891
-
-
http://www.eei.org/industry_issues/energy_infrastructure/natural_gas/index.htm
-
-
-
-
136
-
-
85017356008
-
-
http://www.eei.org/industry_issues/energy_infrastructure/natural_gas/index.htm
-
-
-
-
137
-
-
85017337835
-
The term supply chain refers to the entire network of companies that work together to design, produce, deliver, and service products
-
According to, Stanford University
-
According to Dr. Warren H. Hausman Stanford University, "The term supply chain refers to the entire network of companies that work together to design, produce, deliver, and service products."http://www.supplychainonline.com/cgi-local/preview/SCM101/1.html
-
-
-
Hausman Dr., W.H.1
-
138
-
-
85017363916
-
-
http://www.eia.doe.gov/oiaf/aeo/index.html
-
-
-
-
139
-
-
85017340796
-
-
http://www.pipeline101.com/History/index.html
-
-
-
-
140
-
-
0242413428
-
How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
-
A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
-
C. J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, pp. 8-9. http://www.aopl.org
-
(2001)
, pp. 8-9
-
-
Trench, C.J.1
-
141
-
-
0242413428
-
How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
-
A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
-
C.J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, http://www.aopl.org
-
(2001)
-
-
Trench, C.J.1
-
142
-
-
0242413428
-
How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
-
A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
-
C. J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, http://www.aopl.org, pp. 15-16.
-
(2001)
, pp. 15-16
-
-
Trench, C.J.1
-
143
-
-
85017369664
-
-
National Petroleum Council, Meeting the Challenge of the Nation's Growing Natural Gas Demand, December
-
National Petroleum Council, Meeting the Challenge of the Nation's Growing Natural Gas Demand, December 1999.
-
(1999)
-
-
-
144
-
-
85017368108
-
-
http://www.shellpipeline.com/cd_maps/SPL403_D_gc_crude_f.pdf
-
-
-
-
145
-
-
85017367304
-
-
A red team consisting of two U.S. Navy officers, two civilian analysts,Bill Brickner and Kristen Pearson, did this analysis
-
A red team consisting of two U.S. Navy officers, Charles Hurst and John Cardillo, two civilian analysts,Bill Brickner and Kristen Pearson, did this analysis.
-
-
-
Hurst, C.1
Cardillo, J.2
-
146
-
-
85017351640
-
Operations Analysis
-
Professors, Naval Postgraduate School, Fall
-
Professors Brown and Carlyle, Operations Analysis, Naval Postgraduate School, Fall 2003.
-
(2003)
-
-
Brown1
Carlyle2
-
147
-
-
85017372747
-
-
At the time, the average pump price of gasoline was $1.50/gallon
-
At the time, the average pump price of gasoline was $1.50/gallon.
-
-
-
-
148
-
-
85017342801
-
-
April 1
-
http://www.usdoj.gov/, April 1, 2003.
-
(2003)
-
-
-
149
-
-
85017391401
-
-
http://www.pipelinesafetyfoundation.org/
-
-
-
-
150
-
-
85017385592
-
-
http://www.ops.dot.gov
-
-
-
-
151
-
-
85017405269
-
-
A complete network analysis is left for the reader
-
A complete network analysis is left for the reader.
-
-
-
-
152
-
-
85017387914
-
-
http://www.pipelinesafetyfoundation.org
-
-
-
-
153
-
-
85017336604
-
-
http://www.whitehouse.gov/news/releases/2001/06/energyinit.html.
-
-
-
-
154
-
-
85017383523
-
-
http://www.acmi.net.au/AIC/BELL_BIO.html
-
-
-
-
155
-
-
85017367323
-
-
http://www-t.zhwin.ch/it/su/Block3/TelephoneHistory/history2.htm
-
-
-
-
156
-
-
85017382016
-
-
http://www.att.com/history/history3.html
-
-
-
-
157
-
-
85017354579
-
-
It may seem strange then that the Federal Government does NOT regulate the Internet, which is digital communication technology in the most precise definition of the phrase!
-
It may seem strange then that the Federal Government does NOT regulate the Internet, which is digital communication technology in the most precise definition of the phrase!
-
-
-
-
158
-
-
85017366892
-
-
http://www.ncs.gov/n5_hp/Customer_Service/Brochures/35Anniversary/begina.htm
-
-
-
-
159
-
-
85017338993
-
-
http://www.ncs.gov/n5_hp/Customer_Service/Brochures/35Anniversary/begina.htm
-
-
-
-
160
-
-
85017357248
-
-
http://www.ncs.gov/cwin/
-
-
-
-
161
-
-
85017371210
-
Satellites in Cyberspace
-
Datacomm Research Company
-
Datacomm Research Company, "Satellites in Cyberspace," http://www.researchandmarkets.com/ index.asp
-
-
-
-
162
-
-
18744391816
-
-
October
-
Wireless World, pp. 305-308, October 1945.
-
(1945)
Wireless World
, pp. 305-308
-
-
-
163
-
-
85017376115
-
-
http://www.hq.nasa.gov/office/pao/History/satcomhistory.html
-
-
-
-
164
-
-
85017354700
-
-
http://roland.lerc.nasa.gov/dglover/sat/telstar.html
-
-
-
-
165
-
-
85017342030
-
-
http://www.stratosglobal.com/caseStudies/usLawEnforcement.html
-
-
-
-
166
-
-
85017370627
-
-
http://www.ieee.org/organizations/history_center/milestones_photos/telstar_ukri.html
-
-
-
-
167
-
-
85017376077
-
-
http://www.ncafe.com/chris/pat2/
-
-
-
-
168
-
-
85017342952
-
-
http://www.gsmcoverage.co.uk/maps/europe/gsm_cdma_map.jpg
-
-
-
-
169
-
-
85017343885
-
-
http://www.mouthshut.com/readreview/34613-1.html
-
-
-
-
170
-
-
85017368067
-
-
http://www.mouthshut.com/readreview/34613-1.html
-
-
-
-
171
-
-
85017383030
-
-
http://www.bcr.com/bcrmag/2003/01/p11.asp
-
-
-
-
172
-
-
85017392912
-
-
http://www.carrierhotels.com
-
-
-
-
173
-
-
85017340596
-
-
March 13
-
Richard Clarke, March 13, 2002.
-
(2002)
-
-
Clarke, R.1
-
174
-
-
56349113271
-
Vulnerabilities Task Force Report Concentration of Assets: Telecom Hotels
-
The president's National Security Telecommunications Advisory Committee, February 12
-
The president's National Security Telecommunications Advisory Committee, "Vulnerabilities Task Force Report Concentration of Assets: Telecom Hotels," February 12, 2003.
-
(2003)
-
-
-
175
-
-
85017334690
-
Identifying the risk involved in allowing wireless, portable devices into your company
-
SANS Institute
-
C. McDonough, "Identifying the risk involved in allowing wireless, portable devices into your company," SANS Institute, 2003, p. 6.
-
(2003)
, pp. 6
-
-
McDonough, C.1
-
176
-
-
85017362909
-
-
Jammers block access to a cell phone's radio tower by transmitting a high-powered signal on the same frequency, thus canceling the phone's signal. The result: a poor or erased signal
-
Jammers block access to a cell phone's radio tower by transmitting a high-powered signal on the same frequency, thus canceling the phone's signal. The result: a poor or erased signal.
-
-
-
-
177
-
-
85017400835
-
Cell Phone Jammers, Illegal in U.S., Can Create Silent Zones
-
M. Wylie, "Cell Phone Jammers, Illegal in U.S., Can Create Silent Zones," 2000. http://www.newhouse.com/archive/story1a092200.html
-
(2000)
-
-
Wylie, M.1
-
178
-
-
85017335607
-
-
Encarta World English Dictionary #, Microsoft Corporation. All rights reserved. Developed for Microsoft by Bloomsbury Publishing Plc
-
Encarta World English Dictionary # 1999 Microsoft Corporation. All rights reserved. Developed for Microsoft by Bloomsbury Publishing Plc.
-
(1999)
-
-
-
179
-
-
85017369429
-
-
http://www.ntia.doc.gov/ntiahome/dn/html/Chapter2.htm
-
-
-
-
180
-
-
85017347256
-
-
According to Nielsen/NetRatings, there was a worldwide Internet population of 580 million users, as of, The International Telecommunications Union estimates 665 million users
-
According to Nielsen/NetRatings, there was a worldwide Internet population of 580 million users, as of 2002. The International Telecommunications Union estimates 665 million users.
-
(2002)
-
-
-
181
-
-
85017372475
-
-
An autonomous system (AS) is a collection of Internet routers and switches under a single administrative control, such as an ISP
-
An autonomous system (AS) is a collection of Internet routers and switches under a single administrative control, such as an ISP.
-
-
-
-
182
-
-
1542380420
-
Modeling Diffusion of Technology Generations
-
Bass Economics Working Paper
-
P. I. Bass and F. M. Bass, Modeling Diffusion of Technology Generations, Bass Economics Working Paper, 2001, http://www.basseconomics.com
-
(2001)
-
-
Bass, P.I.1
Bass, F.M.2
-
183
-
-
0003916843
-
Where Wizards Stay Up Late: The Origins of the Internet
-
Simon & Schuster, New York
-
K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996.
-
(1996)
, pp. 304
-
-
Hafner, K.1
Lyon, M.2
-
184
-
-
0003916843
-
Where Wizards Stay Up Late: The Origins of the Internet
-
Simon & Schuster, New York
-
K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996, p. 20.
-
(1996)
-
-
Hafner, K.1
Lyon, M.2
-
185
-
-
0003916843
-
Where Wizards Stay Up Late: The Origins of the Internet
-
Simon & Schuster, New York
-
K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996, p. 38.
-
(1996)
-
-
Hafner, K.1
Lyon, M.2
-
186
-
-
85017384697
-
-
Paul Mockapetris2 of USC/ISI invents DNS with the help of Jon Postel and Craig Partridge
-
Paul Mockapetris2 of USC/ISI invents DNS with the help of Jon Postel and Craig Partridge in 1983.
-
(1983)
-
-
-
187
-
-
85017368635
-
-
An IP number corresponds to the network and specific machine that is connected to the network
-
An IP number corresponds to the network and specific machine that is connected to the network.
-
-
-
-
188
-
-
85017375279
-
-
DNS machine locations are secret because they are the anchor of the Internet
-
DNS machine locations are secret because they are the anchor of the Internet.
-
-
-
-
189
-
-
85017368405
-
-
http://www.postel.org/postel.html
-
-
-
-
190
-
-
85017374208
-
-
http://www.rfc-archive.org/
-
-
-
-
191
-
-
85017355027
-
-
This is called CSMA/CD or Carrier Sense Multiple Access/Collision Detection
-
This is called CSMA/CD or Carrier Sense Multiple Access/Collision Detection.
-
-
-
-
192
-
-
85017364726
-
-
Cisco Systems, one of the most successful companies to commercialize TCP/IP equipment, was founded in 1984 by Leonard Bosack and Sandra Lerner, who later sold their interests in the company for $170 million
-
Cisco Systems, one of the most successful companies to commercialize TCP/IP equipment, was founded in 1984 by Leonard Bosack and Sandra Lerner, who later sold their interests in the company for $170 million.
-
-
-
-
193
-
-
85017382641
-
-
http://www.ibiblio.org/pioneers/andreesen.html
-
-
-
-
194
-
-
85017370883
-
-
In, AOL paid $10 billion in stock for 5-year-old Netscape
-
In 1999, AOL paid $10 billion in stock for 5-year-old Netscape.
-
(1999)
-
-
-
195
-
-
85017394455
-
-
It took 67 years for the public telephone to penetrate 50% of the homes in the United States
-
It took 67 years for the public telephone to penetrate 50% of the homes in the United States.
-
-
-
-
196
-
-
85017374722
-
-
It took 67 years for the public telephone to penetrate 50% of the homes in the United States1/4 Internet Engineering Task Force; IRTF 1/4 Internet Research Task Force
-
It took 67 years for the public telephone to penetrate 50% of the homes in the United States1/4 Internet Engineering Task Force; IRTF 1/4 Internet Research Task Force.
-
-
-
-
197
-
-
85017391621
-
-
http://www.faqs.org/rfcs/rfc3233.html
-
-
-
-
198
-
-
85017353228
-
-
http://www.faqs.org/rfcs/rfc3710.html
-
-
-
-
200
-
-
85017371330
-
-
http://www.icannwatch.org/
-
-
-
-
202
-
-
85017376329
-
-
http://www.circleid.com/channel/index/C0_1_1/
-
-
-
-
203
-
-
85017380032
-
-
http://www.isoc.org/
-
-
-
-
204
-
-
85017402294
-
-
http://www.w3.org/
-
-
-
-
205
-
-
85017390514
-
Analysis of Autonomous Systems
-
Technical Report: Computer Architecture Department, Polytechnic University of Catalonia, Barcelona, Spain
-
J.I. Nieto-Hipolita, and J. M. Borcelo, "Analysis of Autonomous Systems," Technical Report: Computer Architecture Department, Polytechnic University of Catalonia, Barcelona, Spain, 2002.
-
(2002)
-
-
Nieto-Hipolita, J.I.1
Borcelo, J.M.2
-
206
-
-
85017397503
-
-
The Example in Figure 12.6 can be found in the program, a.k.a. NA.jar
-
The Example in Figure 12.6 can be found in the program NetworkAnalsys.html, a.k.a. NA.jar.
-
-
-
-
207
-
-
85017384827
-
-
One can easily argue that the printing press was the most significant advancement in communications before the Internet
-
One can easily argue that the printing press was the most significant advancement in communications before the Internet.
-
-
-
-
208
-
-
85017349841
-
-
http://www.gocsi.com
-
-
-
-
209
-
-
85017348622
-
-
Script kiddies are amateurs out for fun and glory. Black-hats are serious professionals working for financial gain
-
Script kiddies are amateurs out for fun and glory. Black-hats are serious professionals working for financial gain.
-
-
-
-
210
-
-
85017385904
-
-
A worm is a self-activating program that spreads through a computer network like an epidemic
-
A worm is a self-activating program that spreads through a computer network like an epidemic.
-
-
-
-
211
-
-
84870226450
-
Protection of Critical Infrastructures: A New Perspective
-
CERT Analysis Center
-
C.J. Dunlevy, "Protection of Critical Infrastructures: A New Perspective," CERT Analysis Center, 2004, http://www.cert.org
-
(2004)
-
-
Dunlevy, C.J.1
-
212
-
-
85017396046
-
exploits
-
Use the keyword, a search engine such as, a very large number of cyber-threats will be retrieved
-
Use the keyword "exploits" in a search engine such as http://www.google.com a very large number of cyber-threats will be retrieved.
-
-
-
-
213
-
-
0033721503
-
-
A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan, R. Stata, A. Tomkins, and J. Wiener,Computer Networks, 33, p. 309, 2000.
-
(2000)
Computer Networks
, vol.33
, pp. 309
-
-
Broder, A.1
Kumar, R.2
Maghoul, F.3
Raghavan, P.4
Rajagopalan, S.5
Stata, R.6
Tomkins, A.7
Wiener, J.8
-
214
-
-
85017389617
-
-
The Web is somewhat like most of the power grid in this respect
-
The Web is somewhat like most of the power grid in this respect.
-
-
-
-
215
-
-
37649029105
-
Email Networks and the Spread of Computer Viruses
-
Physical Review E
-
M.E.J. Newman, S. Forrest, and J. Balthrop, "Email Networks and the Spread of Computer Viruses," Physical Review E, 66, 035101-(R), 2002.
-
(2002)
, vol.66
, pp. 035101
-
-
Newman, M.E.J.1
Forrest, S.2
Balthrop, J.3
-
216
-
-
85017379243
-
-
MafiaBoy caused and estimated $1.7 billion in lost revenues, but its perpetrator was fined only $250 and sentenced to 8 months in jail
-
MafiaBoy caused and estimated $1.7 billion in lost revenues, but its perpetrator was fined only $250 and sentenced to 8 months in jail.
-
-
-
-
217
-
-
85017359210
-
-
Macros are written in Visual Basic and activated by the user whenever the document is loaded into an Office application
-
Macros are written in Visual Basic and activated by the user whenever the document is loaded into an Office application.
-
-
-
-
218
-
-
85017398931
-
e-mail
-
SYN is short for synchronize and ACK is short for acknowledge-two hold-over signals from the days of teletypes and Western Union, delivery
-
SYN is short for synchronize and ACK is short for acknowledge-two hold-over signals from the days of teletypes and Western Union "e-mail" delivery.
-
-
-
-
219
-
-
85017363595
-
-
Spoofing means that source address of packets returned from DNS are changed to something else, which changes the identity of the sender
-
Spoofing means that source address of packets returned from DNS are changed to something else, which changes the identity of the sender.
-
-
-
-
220
-
-
85017381963
-
-
The registry is where Windows keeps the names and authorizations for every program that is allowed to run on a Windows machine
-
The registry is where Windows keeps the names and authorizations for every program that is allowed to run on a Windows machine.
-
-
-
-
221
-
-
85017365078
-
-
A session and an application is almost identical, so hacking an open session is tantamount to hacking a running application
-
A session and an application is almost identical, so hacking an open session is tantamount to hacking a running application.
-
-
-
-
222
-
-
85017394062
-
-
http://www.avast.com
-
-
-
-
223
-
-
0008783791
-
Cyber Attacks During the War on Terrorism: A Predictive Analysis
-
Institute for Security Technology Studies, Dartmouth College, September 22, 45 Lyme Road, Hanover, NH 03755
-
M.Vatis, "Cyber Attacks During the War on Terrorism: A Predictive Analysis," Institute for Security Technology Studies, Dartmouth College, September 22, 2001, 45 Lyme Road, Hanover, NH 03755,http://www.ists.dartmouth.edu/ISTS
-
(2001)
-
-
Vatis, M.1
-
224
-
-
14844325969
-
Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
-
Center for Strategic and International Studies, Washington, D.C., December
-
J.A. Lewis, "Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats," Center for Strategic and International Studies, Washington, D.C., December 2002. http://www.csis.org
-
(2002)
-
-
Lewis, J.A.1
-
225
-
-
85017396576
-
-
http://www.gocsi.com
-
-
-
-
226
-
-
85017353828
-
-
HR 4246 introduced into the 106th Congress, 2nd session, April
-
HR 4246 introduced into the 106th Congress, 2nd session, April 2000.
-
(2000)
-
-
-
227
-
-
85017348461
-
-
A trusted path is a mechanism by which a person using a terminal can communicate directly with the TCB.The TP can only be activated by the person or the TCB and cannot be imitated by untrusted software
-
A trusted path is a mechanism by which a person using a terminal can communicate directly with the TCB.The TP can only be activated by the person or the TCB and cannot be imitated by untrusted software.
-
-
-
-
228
-
-
85017367218
-
-
FIPS is the Federal Information Processing Standard
-
FIPS is the Federal Information Processing Standard.
-
-
-
-
229
-
-
85017381066
-
Sally always tells the truth," and Sally says, "Tom always lies." Is Sally lying now?
-
Deciding whether a computer system is secure has been shown to be impossible, by mathematical logic.Consider the following paradox: Tom says, It is impossible to decide. In a similar fashion, system security can be shown to be undecidable
-
Deciding whether a computer system is secure has been shown to be impossible, by mathematical logic.Consider the following paradox: Tom says, "Sally always tells the truth," and Sally says, "Tom always lies." Is Sally lying now? It is impossible to decide. In a similar fashion, system security can be shown to be undecidable.
-
-
-
-
230
-
-
85017340486
-
-
Cracking is the process of illegally decoding ciphertext into plaintext
-
Cracking is the process of illegally decoding ciphertext into plaintext.
-
-
-
-
231
-
-
85017358660
-
-
Virtual Private Network. A network that uses the Internet rather than leased lines for connections. Security is guaranteed by means of a, connection in which the entire TCP/IP packet (content and addresses) is encrypted and encapsulated
-
Virtual Private Network. A network that uses the Internet rather than leased lines for connections. Security is guaranteed by means of a tunnel connection in which the entire TCP/IP packet (content and addresses) is encrypted and encapsulated.
-
tunnel
-
-
-
232
-
-
85017405074
-
-
LDAP-defined by the IETF-defines a relatively simple protocol for updating and searching directories running over TCP/IP
-
LDAP-defined by the IETF-defines a relatively simple protocol for updating and searching directories running over TCP/IP.
-
-
-
-
233
-
-
85017377084
-
-
A simple definition of cryptology is the study of secret messages
-
A simple definition of cryptology is the study of secret messages.
-
-
-
-
234
-
-
85017337350
-
-
http://library.thinkquest.org/27158/concept2_1.html
-
-
-
-
235
-
-
85017332618
-
-
Moore's Law says processing speed doubles every 1.5 years. So, 1.5 _ 112 1/4 168
-
Moore's Law says processing speed doubles every 1.5 years. So, 1.5 _ 112 1/4 168.
-
-
-
-
236
-
-
4344714801
-
AES Proposal: Rijndael, AES Algorithm Submission
-
September 3
-
J.Daemen and V. Rijmen, "AES Proposal: Rijndael, AES Algorithm Submission," September 3, 1999,http://www.nist.gov/CryptoToolkit
-
(1999)
-
-
Daemen, J.1
Rijmen, V.2
-
237
-
-
0017018484
-
New Directions In Cryptography
-
IEEE Transactions on Information Theory, November
-
W. Diffie and M. Hellman, "New Directions In Cryptography," IEEE Transactions on Information Theory, vol. IT-22(6), pp. 644-654, November 1976.
-
(1976)
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
238
-
-
85017403249
-
The Phil Zimmerman Case
-
C.Gimon, "The Phil Zimmerman Case," http://www.skypoint.com/members/gimonca/philzima.html
-
-
-
Gimon, C.1
-
239
-
-
0004196798
-
On Digital Signatures and Public Key Cryptosystems
-
MIT Laboratory for Computer Science Technical Memorandum 82, April
-
R.L. Rivest, A. Shamir, and L. Adelman, "On Digital Signatures and Public Key Cryptosystems," MIT Laboratory for Computer Science Technical Memorandum 82, April 1977.
-
(1977)
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
240
-
-
85017402753
-
-
Public key encryption uses numbers in excess of 200 digits long!
-
Public key encryption uses numbers in excess of 200 digits long!
-
-
-
-
241
-
-
85017388794
-
-
A prime number is a positive number that is divisible by one and itself only. Prime numbers can be found by computerized mathematical sieve techniques that take time proportional to the size of the prime number
-
A prime number is a positive number that is divisible by one and itself only. Prime numbers can be found by computerized mathematical sieve techniques that take time proportional to the size of the prime number.
-
-
-
-
242
-
-
85017343277
-
-
RSA.java can be found on the Web or the disk accompanying this book
-
RSA.java can be found on the Web or the disk accompanying this book.
-
-
-
-
243
-
-
85017360499
-
-
http://www.linktionary.com/p/pki.html
-
-
-
-
244
-
-
85017390769
-
-
Defining boundaries among LDAP directories, authentication, and PKI is a moving target because these technologies seem to be merging into a comprehensive system of security
-
Defining boundaries among LDAP directories, authentication, and PKI is a moving target because these technologies seem to be merging into a comprehensive system of security.
-
-
-
-
245
-
-
84931400962
-
Cyber security-Growing Risk from Growing Vulnerability
-
CERT, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Testimony given before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development,June 25
-
R.D. Pethia, "Cyber security-Growing Risk from Growing Vulnerability," CERT, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Testimony given before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development,June 25, 2003. http://hsc.house.gov/files/Testimony.pethia.pdf
-
(2003)
-
-
Pethia, R.D.1
|