|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn795808308 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120619s2012 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d B24X7
|d OCLCQ
|d N$T
|d NYMPP
|d E7B
|d DEBSZ
|d YDXCP
|d IDEBK
|d REB
|d EBLCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d AGLDB
|d Z5A
|d OCLCQ
|d MERUC
|d OCLCQ
|d UPM
|d STF
|d VTS
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d OCLCO
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 784886063
|a 843035128
|
020 |
|
|
|a 9781606503027
|q (electronic bk.)
|
020 |
|
|
|a 1606503022
|q (electronic bk.)
|
020 |
|
|
|a 1283895617
|
020 |
|
|
|a 9781283895613
|
020 |
|
|
|z 9781606503003
|
020 |
|
|
|z 1606503006
|
029 |
1 |
|
|a AU@
|b 000049552297
|
029 |
1 |
|
|a AU@
|b 000053034052
|
029 |
1 |
|
|a DEBBG
|b BV040902185
|
029 |
1 |
|
|a DEBBG
|b BV043096512
|
029 |
1 |
|
|a DEBSZ
|b 378296531
|
029 |
1 |
|
|a DEBSZ
|b 381382532
|
029 |
1 |
|
|a DEBSZ
|b 421312203
|
029 |
1 |
|
|a DEBSZ
|b 423073478
|
029 |
1 |
|
|a DEBSZ
|b 431114668
|
029 |
1 |
|
|a DEBSZ
|b 456494243
|
029 |
1 |
|
|a NZ1
|b 15407096
|
035 |
|
|
|a (OCoLC)795808308
|z (OCoLC)784886063
|z (OCoLC)843035128
|
037 |
|
|
|a CL0500000146
|b Safari Books Online
|
050 |
|
4 |
|a TJ217.2
|b .L364 2012
|
072 |
|
7 |
|a TEC
|x 004000
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 037000
|2 bisacsh
|
082 |
0 |
4 |
|a 629.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Langner, Ralph.
|
245 |
1 |
0 |
|a Robust control system networks :
|b how to achieve reliable control after Stuxnet /
|c Ralph Langner.
|
260 |
|
|
|a New York :
|b Momentum Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xiii, 206 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references (pages 187-188) and index.
|
505 |
0 |
|
|a 1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness.
|
520 |
3 |
|
|a The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Robust control.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Commande robuste.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Automation.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Robotics.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Robust control
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Langner, Ralph.
|t Robust control system networks.
|d New York : Momentum Press ; 2012
|z 9781606503003
|w (OCoLC)731915143
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501116
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n robustcontrolsys0000lang
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26834579
|
938 |
|
|
|a Books 24x7
|b B247
|n bke00047447
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL883395
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10528328
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 501116
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis24444209
|
938 |
|
|
|a Momentum Press
|b NYMP
|n 9781606503027
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7136366
|
994 |
|
|
|a 92
|b IZTAP
|