|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-41485-5 |
003 |
DE-He213 |
005 |
20220115061334.0 |
007 |
cr nn 008mamaa |
008 |
131018s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642414855
|9 978-3-642-41485-5
|
024 |
7 |
|
|a 10.1007/978-3-642-41485-5
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Critical Information Infrastructures Security
|h [electronic resource] :
|b 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers /
|c edited by Bernhard Hämmerli, Nils Kalstad Svendsen, Javier Lopez.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XIV, 277 p. 103 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7722
|
505 |
0 |
|
|a Intrusion management -- Smart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Hämmerli, Bernhard.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Kalstad Svendsen, Nils.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lopez, Javier.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642414862
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642414848
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7722
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-41485-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|