Handbook on securing cyber-physical critical infrastructure:
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Morgan Kaufmann
© 2012
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9780124158153 0124158153 9780124159105 0124159109 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125740 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2012 |||| o||u| ||||||eng d | ||
020 | |a 9780124158153 |9 978-0-12-415815-3 | ||
020 | |a 0124158153 |9 0-12-415815-3 | ||
020 | |a 9780124159105 |9 978-0-12-415910-5 | ||
020 | |a 0124159109 |9 0-12-415910-9 | ||
035 | |a (ZDB-33-ESD)ocn775791709 | ||
035 | |a (OCoLC)775791709 | ||
035 | |a (DE-599)BVBBV046125740 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Handbook on securing cyber-physical critical infrastructure |c Sajal Das, Krishna Kant, Nan Zhang (editors) |
264 | 1 | |a Waltham, MA |b Morgan Kaufmann |c © 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a IT-säkerhet |2 sao | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Das, Sajal K. |e Sonstige |4 oth | |
700 | 1 | |a Kant, Krishna |e Sonstige |4 oth | |
700 | 1 | |a Zhang, Nan |d 1982- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1283434245 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781283434249 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124158153 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506193 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124158153 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445133275136 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046125740 |
classification_rvk | ST 276 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn775791709 (OCoLC)775791709 (DE-599)BVBBV046125740 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04107nmm a2200613zc 4500</leader><controlfield tag="001">BV046125740</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="9">978-0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124158153</subfield><subfield code="9">0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124159105</subfield><subfield code="9">978-0-12-415910-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124159109</subfield><subfield code="9">0-12-415910-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn775791709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)775791709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125740</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook on securing cyber-physical critical infrastructure</subfield><subfield code="c">Sajal Das, Krishna Kant, Nan Zhang (editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IT-säkerhet</subfield><subfield code="2">sao</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Sajal K.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kant, Krishna</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Nan</subfield><subfield code="d">1982-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1283434245</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781283434249</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506193</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125740 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9780124158153 0124158153 9780124159105 0124159109 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506193 |
oclc_num | 775791709 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Morgan Kaufmann |
record_format | marc |
spelling | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) Waltham, MA Morgan Kaufmann © 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast IT-säkerhet sao Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s 1\p DE-604 Das, Sajal K. Sonstige oth Kant, Krishna Sonstige oth Zhang, Nan 1982- Sonstige oth Erscheint auch als Druck-Ausgabe 1283434245 Erscheint auch als Druck-Ausgabe 9781283434249 http://www.sciencedirect.com/science/book/9780124158153 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Handbook on securing cyber-physical critical infrastructure COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast IT-säkerhet sao Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4070085-9 |
title | Handbook on securing cyber-physical critical infrastructure |
title_auth | Handbook on securing cyber-physical critical infrastructure |
title_exact_search | Handbook on securing cyber-physical critical infrastructure |
title_full | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_fullStr | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_full_unstemmed | Handbook on securing cyber-physical critical infrastructure Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_short | Handbook on securing cyber-physical critical infrastructure |
title_sort | handbook on securing cyber physical critical infrastructure |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast IT-säkerhet sao Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security IT-säkerhet Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Datenschutz Computersicherheit Rechnernetz |
url | http://www.sciencedirect.com/science/book/9780124158153 |
work_keys_str_mv | AT dassajalk handbookonsecuringcyberphysicalcriticalinfrastructure AT kantkrishna handbookonsecuringcyberphysicalcriticalinfrastructure AT zhangnan handbookonsecuringcyberphysicalcriticalinfrastructure |