Handbook on Securing Cyber-Physical Critical Infrastructure

Bog
  • Format
  • Bog, hardback
  • Engelsk

Beskrivelse

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

Læs hele beskrivelsen
Detaljer
Størrelse og vægt
  • Vægt1900 g
  • coffee cup img
    10 cm
    book img
    19,1 cm
    23,5 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    ECU Delegation Trust Radiation Nuclear Control theory Earthquakes Epidemics Integrity Lin Scalability Floods Tsunamis Access control Indexes Privacy Policy Public key cryptography Sensor networks Configuration management Authentication Confidentiality Game theory Cluster analysis Semantic Web Online social networks OPTIMIZATION Revocation Security Telecommunications Watermarking Cloud computing Wireless sensor networks Mobile Applications Network Network security CAN Data outsourcing Wireless communications Sybil attack Mobile Ad-hoc Network Cyber-Physical-System Information Aggregation Reprogramming Internet Protocol Static analysis IPv4 Smart-Grid Critical Infrastructure Wireless Networks Vehicular communications Threat Detection Intrusion detection Control-flow integrity Data stream Availability Voice over IP Obfuscation Flashing Smart environments Data Fusion Algebraic graph theory Network Dynamics IPv6 Mobile IP CERT Automotive Network Monitoring Session Initiation Protocol Sequential Probability Ratio Test Sensor network Mobile devices Anonymous communication Compilers Cyber-physical systems Confidentiality constraints Selective encryption Cyber-physical networks Switching Border Gateway Protocol Spatial correlation Data security Jamming Electronic Health Record Estimation Emergency IPsec WiFi Security attack Fragmentation Dependability P2P Routing Anomaly Detection Microcontroller Key management Mobile healthcare K-Anonymity Secure routing Security policy Boolean Satisfiability (SAT) Formal methods Virtual Network Transport Layer Security access control lists (ACL) adaptive middleware and data attacker localization compromised nodes binary decision diagram (BDD) cross-layer denial of service attacks defensive countermeasures cyber-physical spaces design for hardware trust encrypted execution channel response dnssec fat-tree formal modeling and reasoning code integrity cyber-physical infrastructure Data Center detection and identification Domain Name System (DNS) Identity-based attack emergency vehicle grid memory protection mobility support node replication detection infrastructure robustness Received Signal Strength sense and response sequence discovery run-time systems security in emergency vehicular network spoofing attack Semantic framework intent-based adversary model vehicular grid surveillance inverse and forward problems Widely spreading worm virtual LAN (VLAN) node compromise detection OBD-II sacrificial nodes pervasive secure coprocessing privilege delegation Trojan circuit Security/vulnerability topology-based attack utility loss relation privacy spanning tree protocol virtual node

    Velkommen til Saxo – din danske boghandel

    Hos os kan du handle som gæst, Saxo-bruger eller Saxo-medlem – du bestemmer selv. Skulle du få brug for hjælp, sidder vores kundeservice-team klar ved både telefonerne og tasterne.

    Om medlemspriser hos Saxo

    For at købe bøger til medlemspris skal du være medlem af Saxo Premium, Saxo Shopping eller Saxo Ung. De første 7 dage er gratis for nye medlemmer. Medlemskabet fornyes automatisk og kan altid opsiges. Læs mere om fordelene ved vores forskellige medlemskaber her.

    Machine Name: SAXO082