Handbook on securing cyber-physical critical infrastructure:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Morgan Kaufmann
c2012
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (848 pages) Illustrationen, Diagramme |
ISBN: | 9780124158153 0124158153 9780124159105 0124159109 1283434245 9781283434249 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305204 | ||
003 | DE-604 | ||
005 | 20201028 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 |||| o||u| ||||||eng d | ||
020 | |a 9780124158153 |c electronic bk. |9 978-0-12-415815-3 | ||
020 | |a 0124158153 |c electronic bk. |9 0-12-415815-3 | ||
020 | |a 9780124159105 |c electronic bk. |9 978-0-12-415910-5 | ||
020 | |a 0124159109 |c electronic bk. |9 0-12-415910-9 | ||
020 | |a 1283434245 |9 1-283-43424-5 | ||
020 | |a 9781283434249 |9 978-1-283-43424-9 | ||
035 | |a (ZDB-4-EBA)ocn775791709 | ||
035 | |a (ZDB-4-ITC)ocn775791709 | ||
035 | |a (OCoLC)775791709 | ||
035 | |a (DE-599)BVBBV042305204 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Handbook on securing cyber-physical critical infrastructure |c Sajal Das, Krishna Kant, Nan Zhang (editors) |
264 | 1 | |a Waltham, MA |b Morgan Kaufmann |c c2012 | |
300 | |a 1 Online-Ressource (848 pages) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Handbooks, manuals, etc |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Das, Sajal |d 1960- |e Sonstige |0 (DE-588)141294477 |4 oth | |
700 | 1 | |a Kant, Krishna |e Sonstige |4 oth | |
700 | 1 | |a Zhang, Nan |e Sonstige |0 (DE-588)1041903464 |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124158153 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-4-EBA |a ZDB-33-EBS |a ZDB-4-ITC | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742196 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124158153 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152888046387200 |
---|---|
any_adam_object | |
author_GND | (DE-588)141294477 (DE-588)1041903464 |
building | Verbundindex |
bvnumber | BV042305204 |
classification_rvk | ST 276 |
collection | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn775791709 (ZDB-4-ITC)ocn775791709 (OCoLC)775791709 (DE-599)BVBBV042305204 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04230nmm a2200637zc 4500</leader><controlfield tag="001">BV042305204</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201028 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124158153</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124159105</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-415910-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124159109</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-415910-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283434245</subfield><subfield code="9">1-283-43424-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283434249</subfield><subfield code="9">978-1-283-43424-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn775791709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn775791709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)775791709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305204</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook on securing cyber-physical critical infrastructure</subfield><subfield code="c">Sajal Das, Krishna Kant, Nan Zhang (editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (848 pages)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Handbooks, manuals, etc</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Sajal</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)141294477</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kant, Krishna</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Nan</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1041903464</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742196</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042305204 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9780124158153 0124158153 9780124159105 0124159109 1283434245 9781283434249 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742196 |
oclc_num | 775791709 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (848 pages) Illustrationen, Diagramme |
psigel | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD_Kauf |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Morgan Kaufmann |
record_format | marc |
spelling | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) Waltham, MA Morgan Kaufmann c2012 1 Online-Ressource (848 pages) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout Includes bibliographical references and index Handbooks, manuals, etc fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s DE-604 Das, Sajal 1960- Sonstige (DE-588)141294477 oth Kant, Krishna Sonstige oth Zhang, Nan Sonstige (DE-588)1041903464 oth http://www.sciencedirect.com/science/book/9780124158153 Verlag Volltext |
spellingShingle | Handbook on securing cyber-physical critical infrastructure Handbooks, manuals, etc fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4070085-9 (DE-588)4274324-2 |
title | Handbook on securing cyber-physical critical infrastructure |
title_auth | Handbook on securing cyber-physical critical infrastructure |
title_exact_search | Handbook on securing cyber-physical critical infrastructure |
title_full | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_fullStr | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_full_unstemmed | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_short | Handbook on securing cyber-physical critical infrastructure |
title_sort | handbook on securing cyber physical critical infrastructure |
topic | Handbooks, manuals, etc fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Handbooks, manuals, etc COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz Rechnernetz Computersicherheit |
url | http://www.sciencedirect.com/science/book/9780124158153 |
work_keys_str_mv | AT dassajal handbookonsecuringcyberphysicalcriticalinfrastructure AT kantkrishna handbookonsecuringcyberphysicalcriticalinfrastructure AT zhangnan handbookonsecuringcyberphysicalcriticalinfrastructure |