Handbook on Securing Cyber-Physical Critical Infrastructure

個数:
電子版価格
¥17,691
  • 電子版あり

Handbook on Securing Cyber-Physical Critical Infrastructure

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 848 p.
  • 言語 ENG
  • 商品コード 9780124158153
  • DDC分類 005.8

基本説明

This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems.

Full Description

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

Contents

Introduction: Securing Cyber-Physical Infrastructures--An OverviewPart 1: Theoretical Foundations of SecurityChapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic ApproachChapter 2: Game Theory for Infrastructure Security - The Power of Intent-Based Adversary ModelsChapter 3: An Analytical Framework for Cyber-Physical NetworksChapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and ApplicationPart 2: Security for Wireless Mobile NetworksChapter 5: Mobile Wireless Network SecurityChapter 6: Robust Wireless Infrastructure against Jamming AttacksChapter 7: Security for Mobile Ad Hoc NetworksChapter 8: Defending against Identity-Based Attacks in Wireless NetworksPart 3: Security for Sensor NetworksChapter 9: Efficient and Distributed Access Control for Sensor NetworksChapter 10: Defending against Physical Attacks in Wireless Sensor NetworksChapter 11: Node Compromise Detection in Wireless Sensor NetworksPart 4: Platform SecurityChapter 12: Hardware and Security: Vulnerabilities and SolutionsChapter 13: Languages and Security: Safer Software Through Language and Compiler TechniquesPart 5: Cloud Computing and Data SecurityChapter 14: Protecting Data in Outsourcing ScenariosChapter 15: Data Security in Cloud ComputingChapter 16: Secure Mobile Cloud ComputingChapter 17: Relation Privacy Preservation in Online Social NetworksPart 6: Event Monitoring and Situation AwarenessChapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical InfrastructureChapter 19: Discovering and Tracking Patterns of Interest in Security Sensor StreamsChapter 20: Pervasive Sensing and Monitoring for Situational AwarenessChapter 21: Sense and Response Systems for Crisis ManagementPart 7. Policy Issues in Security ManagementChapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven ApproachChapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise NetworksPart 8: Security Issues in Real-World SystemsChapter 25: Security and Privacy in the Smart GridChapter 26: Cyber-physical Security of Automotive Information TechnologyChapter 27: Security and Privacy for Mobile Healthcare (m-Health) SystemsChapter 28: Security and Robustness in the Internet InfrastructureChapter 29: Emergency Vehicular NetworksChapter 30: Security Issues in VoIP Telecommunication Networks

最近チェックした商品