Critical Infrastructure Protection XVII (Record no. 87208)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05527nam a22006015i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-49585-4 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730170831.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231228s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031495854 |
-- | 978-3-031-49585-4 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Critical Infrastructure Protection XVII |
Sub Title | 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | X, 253 p. 84 illus., 7 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | IFIP Advances in Information and Communication Technology, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues Smart Grid Risks and Impacts Network and Telecommunications Systems Security Infrastructure Security Automobile Security This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Seventeenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2023. Critical Infrastructure Protection XVII is an important resource for researchers, faculty members and graduate students, as well as for as well as for policy makers, practitioners and other individuals with interests in homeland security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
700 1# - AUTHOR 2 | |
Author 2 | Staggs, Jason. |
700 1# - AUTHOR 2 | |
Author 2 | Shenoi, Sujeet. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-49585-4 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Engineering and Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Legal Aspects of Computing. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1868-422X ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.