Handbook on securing cyber-physical critical infrastructure: foundation and challenges
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...
Gespeichert in:
Weitere beteiligte Personen: | , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Morgan Kaufmann
2012
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780124158153/?ar |
Zusammenfassung: | The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxx, 816 Seiten) illustrations |
ISBN: | 9780124159105 0124159109 0124158153 9780124158153 1283434245 9781283434249 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047404450 | ||
003 | DE-627-1 | ||
005 | 20240228115032.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9780124159105 |9 978-0-12-415910-5 | ||
020 | |a 0124159109 |9 0-12-415910-9 | ||
020 | |a 0124158153 |9 0-12-415815-3 | ||
020 | |a 9780124158153 |9 978-0-12-415815-3 | ||
020 | |a 1283434245 |9 1-283-43424-5 | ||
020 | |a 9781283434249 |9 978-1-283-43424-9 | ||
020 | |a 9780124158153 |9 978-0-12-415815-3 | ||
035 | |a (DE-627-1)047404450 | ||
035 | |a (DE-599)KEP047404450 | ||
035 | |a (ORHE)9780124158153 | ||
035 | |a (DE-627-1)047404450 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Handbook on securing cyber-physical critical infrastructure |b foundation and challenges |c Sajal Das, Krishna Kant, Nan Zhang (editors) |
264 | 1 | |a Waltham, MA |b Morgan Kaufmann |c 2012 | |
300 | |a 1 Online-Ressource (xxx, 816 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. | ||
650 | 0 | |a Computer networks |v Handbooks, manuals, etc |x Security measures | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc | |
650 | 4 | |a Sécurité informatique ; Guides, manuels, etc | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Handbooks and manuals | |
700 | 1 | |a Das, Sajal K. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Kant, Krishna |e MitwirkendeR |4 ctb | |
700 | 1 | |a Zhang, Nan |d 1982- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Xue, Mengran |e MitwirkendeR |4 ctb | |
700 | 1 | |a Xin, Jin |e MitwirkendeR |4 ctb | |
700 | 1 | |a Rao, Nageswara S. V. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yu, Wei |d 1981- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Barbeau, Michel |e MitwirkendeR |4 ctb | |
700 | 1 | |a Noubir, Guevara |e MitwirkendeR |4 ctb | |
700 | 1 | |a Datta, Raja |e MitwirkendeR |4 ctb | |
700 | 1 | |a Marchang, Ningrinla |e MitwirkendeR |4 ctb | |
700 | 1 | |a Chen, Yingying |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yang, Jie |e MitwirkendeR |4 ctb | |
700 | 1 | |a Liu, Donggang |e MitwirkendeR |4 ctb | |
700 | 1 | |a Teng, Jin |e MitwirkendeR |4 ctb | |
700 | 1 | |a Gu, Wenjun |e MitwirkendeR |4 ctb | |
700 | 1 | |a Xuan, Dong |e MitwirkendeR |4 ctb | |
700 | 1 | |a Ho, Jun-Won |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bloom, Gedare |e MitwirkendeR |4 ctb | |
700 | 1 | |a Simha, Rahul |e MitwirkendeR |4 ctb | |
700 | 1 | |a Smith, Scotty |e MitwirkendeR |4 ctb | |
700 | 1 | |a De Capitani di Vimercate, Sabrina |e MitwirkendeR |4 ctb | |
700 | 1 | |a Foresti, Sara |e MitwirkendeR |4 ctb | |
700 | 1 | |a Samarati, Pierangela |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yu, Shucheng |e MitwirkendeR |4 ctb | |
700 | 1 | |a Lou, Wenjing |e MitwirkendeR |4 ctb | |
700 | 1 | |a Ren, Kui |e MitwirkendeR |4 ctb | |
700 | 1 | |a Raj, Mayank |e MitwirkendeR |4 ctb | |
700 | 1 | |a Di Francesco, Mario |e MitwirkendeR |4 ctb | |
700 | 1 | |a Li, Na |e MitwirkendeR |4 ctb | |
700 | 1 | |a Liu, Yang |e MitwirkendeR |4 ctb | |
700 | 1 | |a Guan, Yong |e MitwirkendeR |4 ctb | |
700 | 1 | |a Rashidi, Parisa |e MitwirkendeR |4 ctb | |
700 | 1 | |a Krishnan, Narayanan |e MitwirkendeR |4 ctb | |
700 | 1 | |a Cook, Diane J. |d 1963- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Mehrotra, Sharad |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bunn, J. J. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Li, Wenjia |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bertino, Elisa |e MitwirkendeR |4 ctb | |
700 | 1 | |a Ghosh, S. K. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Al-Shaer, Ehab |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bera, P. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Cárdenas, Alvaro A. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Safavi-Naini, Reihanah |e MitwirkendeR |4 ctb | |
700 | 1 | |a Brooks, R. R. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yun, Seok Bae |e MitwirkendeR |4 ctb | |
700 | 1 | |a Deng, Juan |e MitwirkendeR |4 ctb | |
700 | 1 | |a Sun, Jinyuan |e MitwirkendeR |4 ctb | |
700 | 1 | |a Deccio, Casey |e MitwirkendeR |4 ctb | |
700 | 1 | |a Gerla, Mario |e MitwirkendeR |4 ctb | |
700 | 1 | |a Yang, Xiaohui |e MitwirkendeR |4 ctb | |
700 | 1 | |a Dantu, Ram |e MitwirkendeR |4 ctb | |
700 | 1 | |a Wijesekera, Duminda |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780124158153 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124158153 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780124158153/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047404450 |
---|---|
_version_ | 1829007816454569985 |
adam_text | |
any_adam_object | |
author2 | Das, Sajal K. Kant, Krishna Zhang, Nan 1982- Xue, Mengran Xin, Jin Rao, Nageswara S. V. Yu, Wei 1981- Barbeau, Michel Noubir, Guevara Datta, Raja Marchang, Ningrinla Chen, Yingying Yang, Jie Liu, Donggang Teng, Jin Gu, Wenjun Xuan, Dong Ho, Jun-Won Bloom, Gedare Simha, Rahul Smith, Scotty De Capitani di Vimercate, Sabrina Foresti, Sara Samarati, Pierangela Yu, Shucheng Lou, Wenjing Ren, Kui Raj, Mayank Di Francesco, Mario Li, Na Liu, Yang Guan, Yong Rashidi, Parisa Krishnan, Narayanan Cook, Diane J. 1963- Mehrotra, Sharad Bunn, J. J. Li, Wenjia Bertino, Elisa Ghosh, S. K. Al-Shaer, Ehab Bera, P. Cárdenas, Alvaro A. Safavi-Naini, Reihanah Brooks, R. R. Yun, Seok Bae Deng, Juan Sun, Jinyuan Deccio, Casey Gerla, Mario Yang, Xiaohui Dantu, Ram Wijesekera, Duminda |
author2_role | ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb ctb |
author2_variant | s k d sk skd k k kk n z nz m x mx j x jx n s v r nsv nsvr w y wy m b mb g n gn r d rd n m nm y c yc j y jy d l dl j t jt w g wg d x dx j w h jwh g b gb r s rs s s ss c d v s d cdvs cdvsd s f sf p s ps s y sy w l wl k r kr m r mr f m d fm fmd n l nl y l yl y g yg p r pr n k nk d j c dj djc s m sm j j b jj jjb w l wl e b eb s k g sk skg e a s eas p b pb a a c aa aac r s n rsn r r b rr rrb s b y sb sby j d jd j s js c d cd m g mg x y xy r d rd d w dw |
author_facet | Das, Sajal K. Kant, Krishna Zhang, Nan 1982- Xue, Mengran Xin, Jin Rao, Nageswara S. V. Yu, Wei 1981- Barbeau, Michel Noubir, Guevara Datta, Raja Marchang, Ningrinla Chen, Yingying Yang, Jie Liu, Donggang Teng, Jin Gu, Wenjun Xuan, Dong Ho, Jun-Won Bloom, Gedare Simha, Rahul Smith, Scotty De Capitani di Vimercate, Sabrina Foresti, Sara Samarati, Pierangela Yu, Shucheng Lou, Wenjing Ren, Kui Raj, Mayank Di Francesco, Mario Li, Na Liu, Yang Guan, Yong Rashidi, Parisa Krishnan, Narayanan Cook, Diane J. 1963- Mehrotra, Sharad Bunn, J. J. Li, Wenjia Bertino, Elisa Ghosh, S. K. Al-Shaer, Ehab Bera, P. Cárdenas, Alvaro A. Safavi-Naini, Reihanah Brooks, R. R. Yun, Seok Bae Deng, Juan Sun, Jinyuan Deccio, Casey Gerla, Mario Yang, Xiaohui Dantu, Ram Wijesekera, Duminda |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047404450 (DE-599)KEP047404450 (ORHE)9780124158153 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06200cam a22011412c 4500</leader><controlfield tag="001">ZDB-30-ORH-047404450</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115032.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124159105</subfield><subfield code="9">978-0-12-415910-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124159109</subfield><subfield code="9">0-12-415910-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124158153</subfield><subfield code="9">0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="9">978-0-12-415815-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283434245</subfield><subfield code="9">1-283-43424-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283434249</subfield><subfield code="9">978-1-283-43424-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="9">978-0-12-415815-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047404450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780124158153</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404450</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook on securing cyber-physical critical infrastructure</subfield><subfield code="b">foundation and challenges</subfield><subfield code="c">Sajal Das, Krishna Kant, Nan Zhang (editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 816 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Sajal K.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kant, Krishna</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Nan</subfield><subfield code="d">1982-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xue, Mengran</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xin, Jin</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao, Nageswara S. V.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Wei</subfield><subfield code="d">1981-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barbeau, Michel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Noubir, Guevara</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Datta, Raja</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marchang, Ningrinla</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Yingying</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Jie</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Donggang</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teng, Jin</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gu, Wenjun</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xuan, Dong</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ho, Jun-Won</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bloom, Gedare</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Simha, Rahul</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Scotty</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">De Capitani di Vimercate, Sabrina</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foresti, Sara</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samarati, Pierangela</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Shucheng</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lou, Wenjing</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ren, Kui</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Raj, Mayank</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Di Francesco, Mario</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Na</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Yang</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guan, Yong</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rashidi, Parisa</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishnan, Narayanan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cook, Diane J.</subfield><subfield code="d">1963-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mehrotra, Sharad</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bunn, J. J.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Wenjia</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghosh, S. K.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Shaer, Ehab</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bera, P.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cárdenas, Alvaro A.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Safavi-Naini, Reihanah</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brooks, R. R.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yun, Seok Bae</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deng, Juan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Jinyuan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deccio, Casey</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gerla, Mario</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Xiaohui</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dantu, Ram</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wijesekera, Duminda</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780124158153</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124158153</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780124158153/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047404450 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:19Z |
institution | BVB |
isbn | 9780124159105 0124159109 0124158153 9780124158153 1283434245 9781283434249 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxx, 816 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Morgan Kaufmann |
record_format | marc |
spelling | Handbook on securing cyber-physical critical infrastructure foundation and challenges Sajal Das, Krishna Kant, Nan Zhang (editors) Waltham, MA Morgan Kaufmann 2012 1 Online-Ressource (xxx, 816 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Computer networks ; Security measures Computer security Handbooks and manuals Das, Sajal K. MitwirkendeR ctb Kant, Krishna MitwirkendeR ctb Zhang, Nan 1982- MitwirkendeR ctb Xue, Mengran MitwirkendeR ctb Xin, Jin MitwirkendeR ctb Rao, Nageswara S. V. MitwirkendeR ctb Yu, Wei 1981- MitwirkendeR ctb Barbeau, Michel MitwirkendeR ctb Noubir, Guevara MitwirkendeR ctb Datta, Raja MitwirkendeR ctb Marchang, Ningrinla MitwirkendeR ctb Chen, Yingying MitwirkendeR ctb Yang, Jie MitwirkendeR ctb Liu, Donggang MitwirkendeR ctb Teng, Jin MitwirkendeR ctb Gu, Wenjun MitwirkendeR ctb Xuan, Dong MitwirkendeR ctb Ho, Jun-Won MitwirkendeR ctb Bloom, Gedare MitwirkendeR ctb Simha, Rahul MitwirkendeR ctb Smith, Scotty MitwirkendeR ctb De Capitani di Vimercate, Sabrina MitwirkendeR ctb Foresti, Sara MitwirkendeR ctb Samarati, Pierangela MitwirkendeR ctb Yu, Shucheng MitwirkendeR ctb Lou, Wenjing MitwirkendeR ctb Ren, Kui MitwirkendeR ctb Raj, Mayank MitwirkendeR ctb Di Francesco, Mario MitwirkendeR ctb Li, Na MitwirkendeR ctb Liu, Yang MitwirkendeR ctb Guan, Yong MitwirkendeR ctb Rashidi, Parisa MitwirkendeR ctb Krishnan, Narayanan MitwirkendeR ctb Cook, Diane J. 1963- MitwirkendeR ctb Mehrotra, Sharad MitwirkendeR ctb Bunn, J. J. MitwirkendeR ctb Li, Wenjia MitwirkendeR ctb Bertino, Elisa MitwirkendeR ctb Ghosh, S. K. MitwirkendeR ctb Al-Shaer, Ehab MitwirkendeR ctb Bera, P. MitwirkendeR ctb Cárdenas, Alvaro A. MitwirkendeR ctb Safavi-Naini, Reihanah MitwirkendeR ctb Brooks, R. R. MitwirkendeR ctb Yun, Seok Bae MitwirkendeR ctb Deng, Juan MitwirkendeR ctb Sun, Jinyuan MitwirkendeR ctb Deccio, Casey MitwirkendeR ctb Gerla, Mario MitwirkendeR ctb Yang, Xiaohui MitwirkendeR ctb Dantu, Ram MitwirkendeR ctb Wijesekera, Duminda MitwirkendeR ctb 9780124158153 Erscheint auch als Druck-Ausgabe 9780124158153 |
spellingShingle | Handbook on securing cyber-physical critical infrastructure foundation and challenges Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Computer networks ; Security measures Computer security Handbooks and manuals |
title | Handbook on securing cyber-physical critical infrastructure foundation and challenges |
title_auth | Handbook on securing cyber-physical critical infrastructure foundation and challenges |
title_exact_search | Handbook on securing cyber-physical critical infrastructure foundation and challenges |
title_full | Handbook on securing cyber-physical critical infrastructure foundation and challenges Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_fullStr | Handbook on securing cyber-physical critical infrastructure foundation and challenges Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_full_unstemmed | Handbook on securing cyber-physical critical infrastructure foundation and challenges Sajal Das, Krishna Kant, Nan Zhang (editors) |
title_short | Handbook on securing cyber-physical critical infrastructure |
title_sort | handbook on securing cyber physical critical infrastructure foundation and challenges |
title_sub | foundation and challenges |
topic | Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Computer networks ; Security measures Computer security Handbooks and manuals |
topic_facet | Computer networks Handbooks, manuals, etc Security measures Computer security Handbooks, manuals, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Computer networks ; Security measures Computer security Handbooks and manuals |
work_keys_str_mv | AT dassajalk handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT kantkrishna handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT zhangnan handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT xuemengran handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT xinjin handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT raonageswarasv handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT yuwei handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT barbeaumichel handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT noubirguevara handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT dattaraja handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT marchangningrinla handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT chenyingying handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT yangjie handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT liudonggang handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT tengjin handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT guwenjun handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT xuandong handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT hojunwon handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT bloomgedare handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT simharahul handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT smithscotty handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT decapitanidivimercatesabrina handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT forestisara handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT samaratipierangela handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT yushucheng handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT louwenjing handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT renkui handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT rajmayank handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT difrancescomario handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT lina handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT liuyang handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT guanyong handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT rashidiparisa handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT krishnannarayanan handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT cookdianej handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT mehrotrasharad handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT bunnjj handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT liwenjia handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT bertinoelisa handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT ghoshsk handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT alshaerehab handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT berap handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT cardenasalvaroa handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT safavinainireihanah handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT brooksrr handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT yunseokbae handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT dengjuan handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT sunjinyuan handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT decciocasey handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT gerlamario handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT yangxiaohui handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT danturam handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges AT wijesekeraduminda handbookonsecuringcyberphysicalcriticalinfrastructurefoundationandchallenges |