Cyber-physical attacks: a growing invisible threat
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo
Elsevier BH
[2015]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral |
Beschreibung: | Titelzusatz der Online-Ausgabe: "How they work and how to protect against them" |
Beschreibung: | 1 Online-Ressource (V, 262 Seiten) |
ISBN: | 9780128012901 9780128014639 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042926528 | ||
003 | DE-604 | ||
005 | 20210913 | ||
007 | cr|uuu---uuuuu | ||
008 | 151014s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780128012901 |c Online |9 978-0-12-801290-1 | ||
020 | |a 9780128014639 |c Print |9 978-0-12-801463-9 | ||
035 | |a (OCoLC)930034119 | ||
035 | |a (DE-599)GBV826526918 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Loukas, George |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber-physical attacks |b a growing invisible threat |c George Loukas |
246 | 1 | 3 | |a How they work and how to protect against them |
264 | 1 | |a Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo |b Elsevier BH |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (V, 262 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Titelzusatz der Online-Ausgabe: "How they work and how to protect against them" | ||
520 | 1 | |a Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral | |
650 | 0 | 7 | |a Cyber-physisches System |0 (DE-588)1069505412 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bedrohung |0 (DE-588)4144266-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyber-physisches System |0 (DE-588)1069505412 |D s |
689 | 0 | 1 | |a Bedrohung |0 (DE-588)4144266-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128012901 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ebook |a ZDB-33-EBS | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028353710 |
Datensatz im Suchindex
_version_ | 1804175230833262592 |
---|---|
any_adam_object | |
author | Loukas, George |
author_facet | Loukas, George |
author_role | aut |
author_sort | Loukas, George |
author_variant | g l gl |
building | Verbundindex |
bvnumber | BV042926528 |
collection | ZDB-33-ESD ebook ZDB-33-EBS |
ctrlnum | (OCoLC)930034119 (DE-599)GBV826526918 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02155nmm a2200409 c 4500</leader><controlfield tag="001">BV042926528</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210913 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151014s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128012901</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-801290-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128014639</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-801463-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930034119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV826526918</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loukas, George</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-physical attacks</subfield><subfield code="b">a growing invisible threat</subfield><subfield code="c">George Loukas</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">How they work and how to protect against them</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo</subfield><subfield code="b">Elsevier BH</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (V, 262 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Titelzusatz der Online-Ausgabe: "How they work and how to protect against them"</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bedrohung</subfield><subfield code="0">(DE-588)4144266-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Bedrohung</subfield><subfield code="0">(DE-588)4144266-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128012901</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ebook</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028353710</subfield></datafield></record></collection> |
id | DE-604.BV042926528 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:12:59Z |
institution | BVB |
isbn | 9780128012901 9780128014639 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028353710 |
oclc_num | 930034119 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (V, 262 Seiten) |
psigel | ZDB-33-ESD ebook ZDB-33-EBS FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Elsevier BH |
record_format | marc |
spelling | Loukas, George Verfasser aut Cyber-physical attacks a growing invisible threat George Loukas How they work and how to protect against them Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo Elsevier BH [2015] © 2015 1 Online-Ressource (V, 262 Seiten) txt rdacontent c rdamedia cr rdacarrier Titelzusatz der Online-Ausgabe: "How they work and how to protect against them" Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral Cyber-physisches System (DE-588)1069505412 gnd rswk-swf Bedrohung (DE-588)4144266-0 gnd rswk-swf Cyber-physisches System (DE-588)1069505412 s Bedrohung (DE-588)4144266-0 s DE-604 http://www.sciencedirect.com/science/book/9780128012901 Verlag Volltext |
spellingShingle | Loukas, George Cyber-physical attacks a growing invisible threat Cyber-physisches System (DE-588)1069505412 gnd Bedrohung (DE-588)4144266-0 gnd |
subject_GND | (DE-588)1069505412 (DE-588)4144266-0 |
title | Cyber-physical attacks a growing invisible threat |
title_alt | How they work and how to protect against them |
title_auth | Cyber-physical attacks a growing invisible threat |
title_exact_search | Cyber-physical attacks a growing invisible threat |
title_full | Cyber-physical attacks a growing invisible threat George Loukas |
title_fullStr | Cyber-physical attacks a growing invisible threat George Loukas |
title_full_unstemmed | Cyber-physical attacks a growing invisible threat George Loukas |
title_short | Cyber-physical attacks |
title_sort | cyber physical attacks a growing invisible threat |
title_sub | a growing invisible threat |
topic | Cyber-physisches System (DE-588)1069505412 gnd Bedrohung (DE-588)4144266-0 gnd |
topic_facet | Cyber-physisches System Bedrohung |
url | http://www.sciencedirect.com/science/book/9780128012901 |
work_keys_str_mv | AT loukasgeorge cyberphysicalattacksagrowinginvisiblethreat AT loukasgeorge howtheyworkandhowtoprotectagainstthem |