Cyber-physical attacks: a growing invisible threat
Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read...
Autor principal: | |
---|---|
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
Amsterdam Boston Heidelberg London
Elsevier, BH
[2015]
|
En: | Año: 2015 |
Acceso en línea: |
Inhaltsverzeichnis (Verlag) Inhaltsverzeichnis (Verlag) |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1616538767 | ||
003 | DE-627 | ||
005 | 20241203120114.0 | ||
007 | tu | ||
008 | 150715s2015 ne ||||| 00| ||eng c | ||
020 | |a 9780128012901 |9 978-0-12-801290-1 | ||
020 | |a 0128012900 |9 0-12-801290-0 | ||
035 | |a (DE-627)1616538767 | ||
035 | |a (DE-576)445650486 | ||
035 | |a (DE-599)BSZ445650486 | ||
035 | |a (OCoLC)935885268 | ||
035 | |a (OCoLC)915331262 | ||
035 | |a (AT-OBV)AC12313311 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-NL |c XD-US |c XA-DE |c XA-GB | ||
050 | 0 | |a QA76.9.A25 | |
050 | 0 | |a HV6773 | |
050 | 0 | |a HV6773 |a QA76.9.A25 | |
082 | 0 | |a 364.1/68 |2 23 | |
082 | 0 | |a 364.168 | |
084 | |a ST 276 |2 rvk |0 (DE-625)rvk/143642: | ||
100 | 1 | |a Loukas, George |e VerfasserIn |0 (DE-588)1080839011 |0 (DE-627)84529508X |0 (DE-576)453783929 |4 aut | |
109 | |a Loukas, George | ||
245 | 1 | 0 | |a Cyber-physical attacks |b a growing invisible threat |c George Loukas |
264 | 1 | |a Amsterdam |a Boston |a Heidelberg |a London |b Elsevier, BH |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a viiii, 262 Seiten. |b Illustrationen, Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps. - Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps. - Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Ubiquitous Computing | |
650 | 0 | |a Embedded computer systems | |
650 | 0 | |a Embedded Internet devices | |
650 | 0 | |a Internet of things | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Ubiquitous Computing | |
650 | 0 | |a Embedded computer systems | |
650 | 0 | |a Embedded Internet devices | |
650 | 0 | |a Internet of things | |
689 | 0 | 0 | |d s |0 (DE-588)7713781-4 |0 (DE-627)633870307 |0 (DE-576)327984538 |a Internet der Dinge |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4657367-7 |0 (DE-627)335589820 |0 (DE-576)214729141 |a Ubiquitous Computing |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4396978-1 |0 (DE-627)191533580 |0 (DE-576)212005545 |a Eingebettetes System |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | |5 (DE-627) | |
856 | 4 | 2 | |u http://www.gbv.de/dms/ilmenau/toc/830060103.PDF |m V:DE-601 |m B:DE-ilm1 |q pdf/application |x Verlag |y Inhaltsverzeichnis |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz445650486inh.htm |m B:DE-576;DE-Frei85 |q application/pdf |v 20151023161023 |x Verlag |3 Inhaltsverzeichnis |
889 | |w (DE-627)830060103 | ||
935 | |a mkri | ||
935 | |i mdedup | ||
936 | r | v | |a ST 276 |b Datensicherung (physik.) und angewandte Kryptographie, Computerviren |k Informatik |k Monografien |k Software und -entwicklung |k Datensicherung (physik.) und angewandte Kryptographie, Computerviren |0 (DE-627)127148207X |0 (DE-625)rvk/143642: |0 (DE-576)20148207X |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 320102032X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1616538767 | ||
LOK | |0 005 20151022094605 | ||
LOK | |0 008 150921||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a WA-MARC-krimdoka001.raw |