Cargando…

Handbook on securing cyber-physical critical infrastructure : foundation and challenges /

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Das, Sajal K., Kant, Krishna, Zhang, Nan, 1982-, Xue, Mengran, Xin, Jin, Rao, Nageswara S. V., Yu, Wei, 1981-, Barbeau, Michel (Computer scientist), Noubir, Guevara, Datta, Raja, Marchang, Ningrinla, Chen, Yingying, Yang, Jie, Liu, Donggang, Teng, Jin, Gu, Wenjun, Xuan, Dong, Ho, Jun-Won, Bloom, Gedare, Simha, Rahul, Smith, Scotty, De Capitani di Vimercate, Sabrina, Foresti, Sara, Samarati, Pierangela, Yu, Shucheng, Lou, Wenjing, Ren, Kui, Raj, Mayank, Di Francesco, Mario, Li, Na, Zhang, Nan, Liu, Yang, Guan, Yong, Rashidi, Parisa, Krishnan, Narayanan, Cook, Diane J., 1963-, Mehrotra, Sharad, Bunn, J. J., Li, Wenjia, Bertino, Elisa, Ghosh, S. K., Al-Shaer, Ehab, Bera, P., Cárdenas, Alvaro A., Safavi-Naini, Reihanah, Brooks, R. R. (Richard R.), Yun, Seok Bae, Deng, Juan, Sun, Jinyuan, Deccio, Casey, Gerla, Mario, Yang, Xiaohui, Dantu, Ram, Wijesekera, Duminda
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Morgan Kaufmann, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn806221433
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 120815s2012 maua obf 001 0 eng d
010 |a  2011038620 
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCO  |d VT2  |d COO  |d B24X7  |d OCLCQ  |d OCLCO  |d DEBSZ  |d DKDLA  |d IDEBK  |d CEF  |d SFB  |d OCLCF  |d OCL  |d OCLCQ  |d OCLCA  |d YDX  |d OCLCQ  |d WYU  |d AU@  |d STF  |d NTE  |d BRF  |d EYM  |d OCLCO  |d OCLCQ  |d INARC 
016 7 |a 015959182  |2 Uk 
019 |a 778314655  |a 803469745  |a 817056813  |a 823131535  |a 1042846247  |a 1055322940  |a 1060198069  |a 1063977939  |a 1081284257  |a 1129373381  |a 1152977227  |a 1179724652  |a 1192348405  |a 1194786862  |a 1202541624  |a 1228571406  |a 1393048697 
020 |a 9780124159105 
020 |a 0124159109 
020 |a 0124158153 
020 |a 9780124158153 
020 |a 1283434245 
020 |a 9781283434249 
020 |z 9780124158153 
029 1 |a AU@  |b 000050013522 
029 1 |a AU@  |b 000053282980 
029 1 |a DEBBG  |b BV040900700 
029 1 |a DEBSZ  |b 37827628X 
029 1 |a DEBSZ  |b 381367282 
029 1 |a DKDLA  |b 820120-katalog:000554568 
029 1 |a GBVCP  |b 785363564 
035 |a (OCoLC)806221433  |z (OCoLC)778314655  |z (OCoLC)803469745  |z (OCoLC)817056813  |z (OCoLC)823131535  |z (OCoLC)1042846247  |z (OCoLC)1055322940  |z (OCoLC)1060198069  |z (OCoLC)1063977939  |z (OCoLC)1081284257  |z (OCoLC)1129373381  |z (OCoLC)1152977227  |z (OCoLC)1179724652  |z (OCoLC)1192348405  |z (OCoLC)1194786862  |z (OCoLC)1202541624  |z (OCoLC)1228571406  |z (OCoLC)1393048697 
037 |a CL0500000159  |b Safari Books Online 
050 4 |a TK5105.59  |b .H3533 2012 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Handbook on securing cyber-physical critical infrastructure :  |b foundation and challenges /  |c Sajal Das, Krishna Kant, Nan Zhang (editors). 
260 |a Waltham, MA :  |b Morgan Kaufmann,  |c ©2012. 
300 |a 1 online resource (xxx, 816 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 0 |t Securing cyber-physical infrastructure : perspectives and overview of the handbook --  |t Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach /  |r Mengran Xue [and others] --  |t Game theory for infrastructure security : the power of intent-based adversary models /  |r Xin Jin [and others] --  |t An analytical framework for cyber-physical networks /  |r Nageswara S.V. Rao [and others] --  |t Evolution of widely spreading worms and countermeasures : epidemic theory and application /  |r Wei Yu [and others] --  |t Mobile wireless network security /  |r Michel Barbeau --  |t Robust wireless infrastructure against jamming attacks /  |r Guevara Noubir --  |t Security for mobile ad hoc networks /  |r Raja Datta, Ningrinla Marchang --  |t Defending against identity-based attacks in wireless networks /  |r Yingying Chen, Jie Yang --  |t Efficient and distributed access control for sensor networks /  |r Donggang Liu --  |t Defending against physical attacks in wireless sensor networks /  |r Jin Teng, Wenjun Gu, Dong Xuan --  |t Node compromise detection in wireless sensor networks /  |r Jun-Won Ho, Sajal K. Das --  |t Hardware and security : vulnerabilities and solutions /  |r Gedare Bloom [and others] --  |t Languages and security : safer software through language and compiler techniques /  |r Rahul Simha, Scotty Smith --  |t Protecting ata in outsourcing scenarios /  |r Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati --  |t Data security in cloud computing /  |r Shucheng Yu, Wenjing Lou, Kui Ren --  |t Secure mobile cloud computing /  |r Mayank Raj, Mario Di Francesco, Sajal K. Das --  |t Relation privacy preservation in publishing online social networks /  |r Na Li, Nan Zhang, Sajal K. Das --  |t Distributed network and system monitoring for securing cyber-physical infrastructure /  |r Yang Liu, Yong Guan --  |t Discovering and tracking patterns of interest in security sensor streams /  |r Parisa Rashidi, Narayanan Krishnan, Diane J. Cook --  |t Pervasive sensing and monitoring for situational awareness /  |r Sharad Mehrotra [and others] --  |t Sense and response systems for crisis management /  |r J.J. Bunn [and others] --  |t Managing and securing critical infrastructure -- a semantic policy- and trust-driven approach /  |r Wenjia Li [and others] --  |t Policies, access control, and formal methods /  |r Elisa Bertino --  |t Formal analysis of policy-based security configurations in enterprise networks /  |r S.K. Ghosh, Ehab Al-Shaer, P. Bera --  |t Security and privacy in the smart grid /  |r Alvaro A. Cárdenas, Reihaneh Safavi-Naini --  |t Cyber-physical security of automotive information technology /  |r Richard R. Brooks, Seok Bae Yun, Juan Deng --  |t Security and privacy for mobile health-care (m-Health) systems /  |r Jinyuan Sun [and others] --  |t Security and robustness in the internet infrastructure /  |r Krishna Kant, Casey Deccio --  |t Emergency vehicular networks /  |r Mario Gerla [and others] --  |t Security issues in VoIP telecommunication networks /  |r Xiaohui Yang, Ram Dantu, Duminda Wijesekera. 
504 |a Includes bibliographical references and index. 
520 8 |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. @*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Handbooks and manuals.  |2 fast  |0 (OCoLC)fst01423877 
700 1 |a Das, Sajal K. 
700 1 |a Kant, Krishna. 
700 1 |a Zhang, Nan,  |d 1982- 
700 1 |a Xue, Mengran. 
700 1 |a Xin, Jin. 
700 1 |a Rao, Nageswara S. V. 
700 1 |a Yu, Wei,  |d 1981- 
700 1 |a Barbeau, Michel  |c (Computer scientist) 
700 1 |a Noubir, Guevara. 
700 1 |a Datta, Raja. 
700 1 |a Marchang, Ningrinla. 
700 1 |a Chen, Yingying. 
700 1 |a Yang, Jie. 
700 1 |a Liu, Donggang. 
700 1 |a Teng, Jin. 
700 1 |a Gu, Wenjun. 
700 1 |a Xuan, Dong. 
700 1 |a Ho, Jun-Won. 
700 1 |a Bloom, Gedare. 
700 1 |a Simha, Rahul. 
700 1 |a Smith, Scotty. 
700 1 |a De Capitani di Vimercate, Sabrina. 
700 1 |a Foresti, Sara. 
700 1 |a Samarati, Pierangela. 
700 1 |a Yu, Shucheng. 
700 1 |a Lou, Wenjing. 
700 1 |a Ren, Kui. 
700 1 |a Raj, Mayank. 
700 1 |a Di Francesco, Mario. 
700 1 |a Li, Na. 
700 1 |a Zhang, Nan. 
700 1 |a Liu, Yang. 
700 1 |a Guan, Yong. 
700 1 |a Rashidi, Parisa. 
700 1 |a Krishnan, Narayanan. 
700 1 |a Cook, Diane J.,  |d 1963- 
700 1 |a Mehrotra, Sharad. 
700 1 |a Bunn, J. J. 
700 1 |a Li, Wenjia. 
700 1 |a Bertino, Elisa. 
700 1 |a Ghosh, S. K. 
700 1 |a Al-Shaer, Ehab. 
700 1 |a Bera, P. 
700 1 |a Cárdenas, Alvaro A. 
700 1 |a Safavi-Naini, Reihanah. 
700 1 |a Brooks, R. R.  |q (Richard R.) 
700 1 |a Yun, Seok Bae. 
700 1 |a Deng, Juan. 
700 1 |a Sun, Jinyuan. 
700 1 |a Deccio, Casey. 
700 1 |a Gerla, Mario. 
700 1 |a Yang, Xiaohui. 
700 1 |a Dantu, Ram. 
700 1 |a Wijesekera, Duminda. 
776 0 8 |i Print version:  |t Handbook on securing cyber-physical critical infrastructure.  |d Waltham, MA : Morgan Kaufmann, ©2012  |z 9780124158153  |w (DLC) 2011038620  |w (OCoLC)745980948 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124158153/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00047116 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 343424 
938 |a YBP Library Services  |b YANK  |n 7364089 
938 |a Internet Archive  |b INAR  |n isbn_9780124158153 
994 |a 92  |b IZTAP