Handbook on securing cyber-physical critical infrastructure /:
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA :
Morgan Kaufmann,
©2012.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. |
Beschreibung: | 1 online resource (1 online resource) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124158153 0124158153 9780124159105 0124159109 1784023450 9781784023454 9786613434241 6613434248 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn775791709 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120210s2012 mau obf 001 0 eng d | ||
010 | |z 2011038620 | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d E7B |d YDXCP |d CDX |d COO |d N$T |d OCLCQ |d DEBSZ |d OCLCQ |d IDEBK |d TEFOD |d OCLCF |d TEFOD |d RIV |d OCL |d TEFOD |d OCLCQ |d S3O |d OCLCQ |d ICA |d CCO |d MERUC |d AGLDB |d K6U |d Z5A |d PIFAG |d FVL |d OCLCQ |d SAV |d OCLCQ |d OCLCA |d COCUF |d WRM |d U3W |d D6H |d OCLCQ |d VTS |d OCLCQ |d WYU |d STF |d LEAUB |d M8D |d OL$ |d S2H |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL | ||
019 | |a 778434933 |a 824106869 |a 1259096374 | ||
020 | |a 9780124158153 |q (electronic bk.) | ||
020 | |a 0124158153 |q (electronic bk.) | ||
020 | |a 9780124159105 |q (electronic bk.) | ||
020 | |a 0124159109 |q (electronic bk.) | ||
020 | |z 1283434245 | ||
020 | |z 9781283434249 | ||
020 | |a 1784023450 | ||
020 | |a 9781784023454 | ||
020 | |a 9786613434241 | ||
020 | |a 6613434248 | ||
024 | 8 | |a 9786613434241 | |
035 | |a (OCoLC)775791709 |z (OCoLC)778434933 |z (OCoLC)824106869 |z (OCoLC)1259096374 | ||
037 | |a 1114073:11064441 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
037 | |a BD8CCE91-27AF-4E05-9ADD-EB577C913F9E |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.59 |b .H3533 2012 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Handbook on securing cyber-physical critical infrastructure / |c Sajal Das, Krishna Kant, Nan Zhang (editors). |
260 | |a Waltham, MA : |b Morgan Kaufmann, |c ©2012. | ||
300 | |a 1 online resource (1 online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
520 | |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. | ||
505 | 0 | |a Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks. | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 6 | |a Sécurité informatique |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a IT-säkerhet. |2 sao | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a manuals (instructional materials) |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Das, Sajal K. | |
700 | 1 | |a Kant, Krishna. | |
700 | 1 | |a Zhang, Nan, |d 1982- |1 https://id.oclc.org/worldcat/entity/E39PCjyr4qfRfbXk3YjhPVJrG3 |0 http://id.loc.gov/authorities/names/n2011074433 | |
758 | |i has work: |a Handbook on securing cyber-physical critical infrastructure (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFPxPFKwrcBw4TxPG8jRGb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Handbook on securing cyber-physical critical infrastructure. |d Waltham, MA : Morgan Kaufmann, ©2012 |z 9780124158153 |w (DLC) 2011038620 |w (OCoLC)745980948 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124158153 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124158153 |3 Volltext | |
938 | |a Coutts Information Services |b COUT |n 20691963 | ||
938 | |a ebrary |b EBRY |n ebr10525038 | ||
938 | |a EBSCOhost |b EBSC |n 453871 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 343424 | ||
938 | |a YBP Library Services |b YANK |n 7364089 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn775791709 |
---|---|
_version_ | 1813903427186458624 |
adam_text | |
any_adam_object | |
author2 | Das, Sajal K. Kant, Krishna Zhang, Nan, 1982- |
author2_role | |
author2_variant | s k d sk skd k k kk n z nz |
author_GND | http://id.loc.gov/authorities/names/n2011074433 |
author_facet | Das, Sajal K. Kant, Krishna Zhang, Nan, 1982- |
author_sort | Das, Sajal K. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H3533 2012 |
callnumber-search | TK5105.59 .H3533 2012 |
callnumber-sort | TK 45105.59 H3533 42012 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks. |
ctrlnum | (OCoLC)775791709 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08128cam a2200853 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn775791709</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">120210s2012 mau obf 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011038620</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">CDX</subfield><subfield code="d">COO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TEFOD</subfield><subfield code="d">RIV</subfield><subfield code="d">OCL</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">S3O</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">CCO</subfield><subfield code="d">MERUC</subfield><subfield code="d">AGLDB</subfield><subfield code="d">K6U</subfield><subfield code="d">Z5A</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">COCUF</subfield><subfield code="d">WRM</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OL$</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">778434933</subfield><subfield code="a">824106869</subfield><subfield code="a">1259096374</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124158153</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124159105</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124159109</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1283434245</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781283434249</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1784023450</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784023454</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613434241</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613434248</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9786613434241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)775791709</subfield><subfield code="z">(OCoLC)778434933</subfield><subfield code="z">(OCoLC)824106869</subfield><subfield code="z">(OCoLC)1259096374</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">1114073:11064441</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">BD8CCE91-27AF-4E05-9ADD-EB577C913F9E</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H3533 2012</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook on securing cyber-physical critical infrastructure /</subfield><subfield code="c">Sajal Das, Krishna Kant, Nan Zhang (editors).</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Waltham, MA :</subfield><subfield code="b">Morgan Kaufmann,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IT-säkerhet.</subfield><subfield code="2">sao</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">manuals (instructional materials)</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Sajal K.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kant, Krishna.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Nan,</subfield><subfield code="d">1982-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjyr4qfRfbXk3YjhPVJrG3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011074433</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Handbook on securing cyber-physical critical infrastructure (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFPxPFKwrcBw4TxPG8jRGb</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Handbook on securing cyber-physical critical infrastructure.</subfield><subfield code="d">Waltham, MA : Morgan Kaufmann, ©2012</subfield><subfield code="z">9780124158153</subfield><subfield code="w">(DLC) 2011038620</subfield><subfield code="w">(OCoLC)745980948</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124158153</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">20691963</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10525038</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">453871</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">343424</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7364089</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocn775791709 |
illustrated | Not Illustrated |
indexdate | 2024-10-25T16:18:30Z |
institution | BVB |
isbn | 9780124158153 0124158153 9780124159105 0124159109 1784023450 9781784023454 9786613434241 6613434248 |
language | English |
oclc_num | 775791709 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (1 online resource) |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Morgan Kaufmann, |
record_format | marc |
spelling | Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (editors). Waltham, MA : Morgan Kaufmann, ©2012. 1 online resource (1 online resource) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks. Includes bibliographical references and index. Print version record. English. Computer networks Security measures Handbooks, manuals, etc. Computer security Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast IT-säkerhet. sao handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Das, Sajal K. Kant, Krishna. Zhang, Nan, 1982- https://id.oclc.org/worldcat/entity/E39PCjyr4qfRfbXk3YjhPVJrG3 http://id.loc.gov/authorities/names/n2011074433 has work: Handbook on securing cyber-physical critical infrastructure (Text) https://id.oclc.org/worldcat/entity/E39PCFPxPFKwrcBw4TxPG8jRGb https://id.oclc.org/worldcat/ontology/hasWork Print version: Handbook on securing cyber-physical critical infrastructure. Waltham, MA : Morgan Kaufmann, ©2012 9780124158153 (DLC) 2011038620 (OCoLC)745980948 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124158153 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124158153 Volltext |
spellingShingle | Handbook on securing cyber-physical critical infrastructure / Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks. Computer networks Security measures Handbooks, manuals, etc. Computer security Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast IT-säkerhet. sao |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | Handbook on securing cyber-physical critical infrastructure / |
title_auth | Handbook on securing cyber-physical critical infrastructure / |
title_exact_search | Handbook on securing cyber-physical critical infrastructure / |
title_full | Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (editors). |
title_fullStr | Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (editors). |
title_full_unstemmed | Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (editors). |
title_short | Handbook on securing cyber-physical critical infrastructure / |
title_sort | handbook on securing cyber physical critical infrastructure |
topic | Computer networks Security measures Handbooks, manuals, etc. Computer security Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast IT-säkerhet. sao |
topic_facet | Computer networks Security measures Handbooks, manuals, etc. Computer security Handbooks, manuals, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security IT-säkerhet. handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=453871 https://www.sciencedirect.com/science/book/9780124158153 |
work_keys_str_mv | AT dassajalk handbookonsecuringcyberphysicalcriticalinfrastructure AT kantkrishna handbookonsecuringcyberphysicalcriticalinfrastructure AT zhangnan handbookonsecuringcyberphysicalcriticalinfrastructure |