Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Handbook on securing cyber-physical critical infrastructure : foundation and challenges / Sajal Das, Krishna Kant, Nan Zhang (editors). [O'Reilly electronic resource]

Imprint Waltham, MA : Morgan Kaufmann, ©2012.
QR Code
Description 1 online resource (xxx, 816 pages) : illustrations
Contents Securing cyber-physical infrastructure : perspectives and overview of the handbook -- Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach / Mengran Xue [and others] -- Game theory for infrastructure security : the power of intent-based adversary models / Xin Jin [and others] -- An analytical framework for cyber-physical networks / Nageswara S.V. Rao [and others] -- Evolution of widely spreading worms and countermeasures : epidemic theory and application / Wei Yu [and others] -- Mobile wireless network security / Michel Barbeau -- Robust wireless infrastructure against jamming attacks / Guevara Noubir -- Security for mobile ad hoc networks / Raja Datta, Ningrinla Marchang -- Defending against identity-based attacks in wireless networks / Yingying Chen, Jie Yang -- Efficient and distributed access control for sensor networks / Donggang Liu -- Defending against physical attacks in wireless sensor networks / Jin Teng, Wenjun Gu, Dong Xuan -- Node compromise detection in wireless sensor networks / Jun-Won Ho, Sajal K. Das -- Hardware and security : vulnerabilities and solutions / Gedare Bloom [and others] -- Languages and security : safer software through language and compiler techniques / Rahul Simha, Scotty Smith -- Protecting ata in outsourcing scenarios / Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati -- Data security in cloud computing / Shucheng Yu, Wenjing Lou, Kui Ren -- Secure mobile cloud computing / Mayank Raj, Mario Di Francesco, Sajal K. Das -- Relation privacy preservation in publishing online social networks / Na Li, Nan Zhang, Sajal K. Das -- Distributed network and system monitoring for securing cyber-physical infrastructure / Yang Liu, Yong Guan -- Discovering and tracking patterns of interest in security sensor streams / Parisa Rashidi, Narayanan Krishnan, Diane J. Cook -- Pervasive sensing and monitoring for situational awareness / Sharad Mehrotra [and others] -- Sense and response systems for crisis management / J.J. Bunn [and others] -- Managing and securing critical infrastructure -- a semantic policy- and trust-driven approach / Wenjia Li [and others] -- Policies, access control, and formal methods / Elisa Bertino -- Formal analysis of policy-based security configurations in enterprise networks / S.K. Ghosh, Ehab Al-Shaer, P. Bera -- Security and privacy in the smart grid / Alvaro A. Cárdenas, Reihaneh Safavi-Naini -- Cyber-physical security of automotive information technology / Richard R. Brooks, Seok Bae Yun, Juan Deng -- Security and privacy for mobile health-care (m-Health) systems / Jinyuan Sun [and others] -- Security and robustness in the internet infrastructure / Krishna Kant, Casey Deccio -- Emergency vehicular networks / Mario Gerla [and others] -- Security issues in VoIP telecommunication networks / Xiaohui Yang, Ram Dantu, Duminda Wijesekera.
Bibliography Includes bibliographical references and index.
Summary The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. @*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout.
Subject Computer networks -- Security measures -- Handbooks, manuals, etc.
Computer security -- Handbooks, manuals, etc.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Guides, manuels, etc.
Sécurité informatique -- Guides, manuels, etc.
Computer networks -- Security measures
Computer security
Genre Handbooks and manuals
Added Author Das, Sajal K.
Kant, Krishna.
Zhang, Nan, 1982-
Xue, Mengran.
Xin, Jin.
Rao, Nageswara S. V.
Yu, Wei, 1981-
Barbeau, Michel (Computer scientist)
Noubir, Guevara.
Datta, Raja.
Marchang, Ningrinla.
Chen, Yingying.
Yang, Jie.
Liu, Donggang.
Teng, Jin.
Gu, Wenjun.
Xuan, Dong.
Ho, Jun-Won.
Bloom, Gedare.
Simha, Rahul.
Smith, Scotty.
De Capitani di Vimercate, Sabrina.
Foresti, Sara.
Samarati, Pierangela.
Yu, Shucheng.
Lou, Wenjing.
Ren, Kui.
Raj, Mayank.
Di Francesco, Mario.
Li, Na.
Zhang, Nan.
Liu, Yang.
Guan, Yong.
Rashidi, Parisa.
Krishnan, Narayanan.
Cook, Diane J., 1963-
Mehrotra, Sharad.
Bunn, J. J.
Li, Wenjia.
Bertino, Elisa.
Ghosh, S. K.
Al-Shaer, Ehab.
Bera, P.
Cárdenas, Alvaro A.
Safavi-Naini, Reihanah.
Brooks, R. R. (Richard R.)
Yun, Seok Bae.
Deng, Juan.
Sun, Jinyuan.
Deccio, Casey.
Gerla, Mario.
Yang, Xiaohui.
Dantu, Ram.
Wijesekera, Duminda.
Other Form: Print version: Handbook on securing cyber-physical critical infrastructure. Waltham, MA : Morgan Kaufmann, ©2012 9780124158153 (DLC) 2011038620 (OCoLC)745980948
ISBN 9780124159105
0124159109
0124158153
9780124158153
1283434245
9781283434249
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information