Cargando…

Robust control system networks : how to achieve reliable control after Stuxnet /

The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Langner, Ralph
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Momentum Press, ©2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn795808308
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 120619s2012 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d B24X7  |d OCLCQ  |d N$T  |d NYMPP  |d E7B  |d DEBSZ  |d YDXCP  |d IDEBK  |d REB  |d EBLCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d Z5A  |d OCLCQ  |d MERUC  |d OCLCQ  |d UPM  |d STF  |d VTS  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d OCLCO  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 784886063  |a 843035128 
020 |a 9781606503027  |q (electronic bk.) 
020 |a 1606503022  |q (electronic bk.) 
020 |a 1283895617 
020 |a 9781283895613 
020 |z 9781606503003 
020 |z 1606503006 
029 1 |a AU@  |b 000049552297 
029 1 |a AU@  |b 000053034052 
029 1 |a DEBBG  |b BV040902185 
029 1 |a DEBBG  |b BV043096512 
029 1 |a DEBSZ  |b 378296531 
029 1 |a DEBSZ  |b 381382532 
029 1 |a DEBSZ  |b 421312203 
029 1 |a DEBSZ  |b 423073478 
029 1 |a DEBSZ  |b 431114668 
029 1 |a DEBSZ  |b 456494243 
029 1 |a NZ1  |b 15407096 
035 |a (OCoLC)795808308  |z (OCoLC)784886063  |z (OCoLC)843035128 
037 |a CL0500000146  |b Safari Books Online 
050 4 |a TJ217.2  |b .L364 2012 
072 7 |a TEC  |x 004000  |2 bisacsh 
072 7 |a TEC  |x 037000  |2 bisacsh 
082 0 4 |a 629.8  |2 23 
049 |a UAMI 
100 1 |a Langner, Ralph. 
245 1 0 |a Robust control system networks :  |b how to achieve reliable control after Stuxnet /  |c Ralph Langner. 
260 |a New York :  |b Momentum Press,  |c ©2012. 
300 |a 1 online resource (xiii, 206 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references (pages 187-188) and index. 
505 0 |a 1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness. 
520 3 |a The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Robust control. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Commande robuste. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Automation.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Robotics.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Robust control  |2 fast 
776 0 8 |i Print version:  |a Langner, Ralph.  |t Robust control system networks.  |d New York : Momentum Press ; 2012  |z 9781606503003  |w (OCoLC)731915143 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501116  |z Texto completo 
938 |a Internet Archive  |b INAR  |n robustcontrolsys0000lang 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26834579 
938 |a Books 24x7  |b B247  |n bke00047447 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL883395 
938 |a ebrary  |b EBRY  |n ebr10528328 
938 |a EBSCOhost  |b EBSC  |n 501116 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24444209 
938 |a Momentum Press  |b NYMP  |n 9781606503027 
938 |a YBP Library Services  |b YANK  |n 7136366 
994 |a 92  |b IZTAP