Cantitate/Preț
Produs

Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications: The Springer International Series in Engineering and Computer Science, cartea 400

Autor A. Nejat Ince, Cem Evrendilek, Dag Wilhelmsen, Fadil Gezer
en Limba Engleză Hardback – 31 mai 1997
The subject of this book is Command Control Communication and Information 3 (C I) which is the management infrastructure for any large or complex dynamic resource systems. Here command means the determination of what to do, and control means the ongoing managementofthe execution ofa command. 3 Decision making is the essence of C I which is accomplished through a phased implementation of a set of facilities, communications, personnel, equipment and procedures for monitoring, forecasting, planning, directing, allocating resources, and generating options to achieve specific and general objectives. 3 The C I system that is in question here is for a strategic military command including its subordinate commands. Although the design methodology that will be expounded in the book is for a military system, it can, to a large extent, apply also to tactical military as well as to civilian management information systems (MIS). 3 A C I system is a decision making network that reflects a hierarchical organization 3 of C I nodes. Each node is responsible for the management of some portion ofthe available resources, where the higher level nodes are responsible for a 3 correspondingly greater portion of the resources. Within a C I system both command and control decision making occur at every level of the hierarchy. Command decisions at one level determine how to satisfy the management decisions at a higher level.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 119319 lei  6-8 săpt.
  Springer Us – 11 oct 2012 119319 lei  6-8 săpt.
Hardback (1) 120246 lei  6-8 săpt.
  Springer Us – 31 mai 1997 120246 lei  6-8 săpt.

Din seria The Springer International Series in Engineering and Computer Science

Preț: 120246 lei

Preț vechi: 146642 lei
-18% Nou

Puncte Express: 1804

Preț estimativ în valută:
23015 23923$ 19064£

Carte tipărită la comandă

Livrare economică 05-19 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780792399162
ISBN-10: 0792399161
Pagini: 301
Ilustrații: XIII, 301 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.72 kg
Ediția:1997
Editura: Springer Us
Colecția Springer
Seria The Springer International Series in Engineering and Computer Science

Locul publicării:New York, NY, United States

Public țintă

Research

Cuprins

1 Introduction.- 1.1 Objective and Scope.- 1.2 Definitions.- 1.3 Problem Areas.- 1.4 System Acquisition Phases.- 1.5 Design Methodology.- 1.6 Content of the Book.- 1.7 References.- 2 Methodology for Collecting and Analyzing User Requirements Mission-Oriented Analysis.- 2.1 Coverage.- 2.2 Elements of MOA.- 2.3 Requirements Analysis and Computer Aided System Engineering.- 2.4 Derivation of System Design Parameters and Features.- 2.5 Testbedding and Prototyping.- 2.6 References.- 3 General System Outline Goal Architecture.- 3.1 System Concept.- 3.2 Basic Information Processing Functions.- 3.3 Communication Subsystem.- 3.4 References.- 4 Reference Model.- 4.1 Purpose and Objective.- 4.2 Functional Elements.- 4.3 References.- 5 System Architecture Design.- 5.1 Introduction.- 5.2 Node Level Architecture.- 5.3 Communications Networks.- 5.4 Data and Message Exchange Services.- 5.5 Standards.- 5.6 References.- Annex 5-A Local Area Network (LAN) Technologies and Standards.- Annex 5-B Abbreviations.- Annex 5-C Standards Used by the European Commission.- 6 System Configuration.- 6.1 Scope.- 6.2 Hardware Configuration.- 6.3 Software Configuration.- 6.4 References.- Annex 6-A Data Traffic Calculation.- 7 Security Architecture.- 7.1 Trust in the C3I System.- 7.2 Threats to Computer Systems.- 7.3 Vulnerabilities in Computer Systems.- 7.4 Attacks on Computer Systems.- 7.5 Estimation of Security Risk.- 7.6 Security Solutions.- 7.7 Implementation of Secure Systems Based on TCSEC.- 7.8 Multi Level Secure (MLS) System Design Issues.- 7.9 Alternative Security Designs.- 7.10 References.- 8 System Management.- 8.1 Requirements and Objectives.- 8.2 Surveillance and Control System (SURCONS).- 8.3 References.- 9 System Costing and Implementation.- 9.1 Scope.- 9.2 Cost Methodology.- 9.3 Implementation Plan.- 9.4 References.- Epilogue.