{"id":15843,"date":"2019-08-01T14:00:38","date_gmt":"2019-08-01T17:00:38","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=15843"},"modified":"2019-08-01T12:33:14","modified_gmt":"2019-08-01T15:33:14","slug":"critical-infrastructure-protection-in-homeland-security","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/critical-infrastructure-protection-in-homeland-security\/","title":{"rendered":"Critical Infrastructure Protection in Homeland Security"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15844\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/08\/critical-infrastructure-protection-in-homeland-security.jpg\" alt=\"Critical Infrastructure Protection in Homeland Security\" width=\"145\" height=\"187\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/08\/critical-infrastructure-protection-in-homeland-security.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/08\/critical-infrastructure-protection-in-homeland-security-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Ted G. Lewis<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition Wiley<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation\u2019s infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation\u2019s most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis.<br \/>\nThe most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ted G. Lewis Maison d&#8217;\u00e9dition Wiley R\u00e9sum\u00e9: While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation\u2019s infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation\u2019s most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in&hellip; <\/p>\n","protected":false},"author":3,"featured_media":15844,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,25],"tags":[],"class_list":["post-15843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-publica-e-defesa"],"views":145,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=15843"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15843\/revisions"}],"predecessor-version":[{"id":15845,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15843\/revisions\/15845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/15844"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=15843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=15843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=15843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}