ch. 1. Architecting information infrastructures for security -- ch. 2. At the edges of the critical information infrastructure -- ch. 3. Software engineering for assurance -- ch. 4. Malicious mobile code -- ch. 5. Dependable critical information infrastructure for command and control.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.