Handbook on securing cyber-physical critical infrastructure foundation and challenges

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...

Full description

Bibliographic Details
Main Author: Das, Sajal K.
Other Authors: Kant, Krishna, Zhang, Nan, Xue, Mengran
Format: eBook
Language:English
Published: Waltham, MA Morgan Kaufmann 2012
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03075nmm a2200409 u 4500
001 EB001923417
003 EBX01000000000000001086319
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0124158153 
020 |a 1283434245 
020 |a 9780124158153 
020 |a 9780124159105 
020 |a 0124159109 
050 4 |a TK5105.59 
100 1 |a Das, Sajal K. 
245 0 0 |a Handbook on securing cyber-physical critical infrastructure  |b foundation and challenges  |c Sajal Das, Krishna Kant, Nan Zhang (editors) 
260 |a Waltham, MA  |b Morgan Kaufmann  |c 2012 
300 |a xxx, 816 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
653 |a Computer networks / Security measures / Handbooks, manuals, etc 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures / Guides, manuels, etc 
653 |a Computer security / Handbooks, manuals, etc 
653 |a Sécurité informatique / Guides, manuels, etc 
653 |a Computer networks / Security measures / fast 
653 |a Computer security / fast 
700 1 |a Kant, Krishna 
700 1 |a Zhang, Nan 
700 1 |a Xue, Mengran 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780124158153 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124158153/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. @*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout