56,95 €
56,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
28 °P sammeln
56,95 €
56,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
28 °P sammeln
Als Download kaufen
56,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
28 °P sammeln
Jetzt verschenken
56,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
28 °P sammeln
  • Format: ePub

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports…mehr

Produktbeschreibung
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. - Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios - Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on - Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Sajal K. Das is the Curators' Distinguished Professor and Daniel St. Clair Endowed Chair in Computer Science at Missouri University of Science and Technology, where he was the Chair of Computer Science Department during 2013-2017. He also served the US National Science Foundation (NSF) as a Program Director in the Computer and Network Systems Division. Dr. Das' interdisciplinary research spans cyber-physical systems, IoT, cybersecurity, machine learning, data science, wireless and sensor networks, mobile and pervasive computing, smart environments, parallel/cloud/edge computing, social and biological networks, applied graph theory and game theory. He has contributed significantly to these areas and published extensively in top-tier venues (more than 350 journal articles and more than 450 peer-reviewed conference papers). He coauthored four books, 59 book chapters, and 5 US patents. He directed over $24 million funded research projects. His h-index is 99 with more than 42,000 citations. Dr. Das is the founding Editor-in-Chief of Elsevier's Pervasive and Mobile Computing journal and serves as an Associate Editor of the IEEE Transactions on Mobile Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Sustainable Computing, IEEE/ACM transactions on Networking, ACM Transactions on Sensor Networks, and Journal of Parallel and Distributed Computing. A founder of the IEEE PerCom, WoWMoM, SMARTCOMP and ACM ICDCN conferences, he has served as General and Program Chair of reputed conferences. He is a recipient of 12 Best Paper Awards in flagship conferences like ACM MobiCom and IEEE PerCom; and numerous awards for teaching, mentoring and research including the IEEE Computer Society's Technical Achievement award for pioneering contributions to sensor networks and mobile computing, and the University of Missouri System President's Award for Sustained Career Excellence. Dr. Das has mentored and graduated 12 postdoctoral fellows, 51 Ph.D. scholars, 31 MS thesis, and numerous undergraduate research students. Currently he is supervising 9 Ph.D. students and 4 postdocs. He is a Distinguished alumnus of the Indian Institute of Science, Bangalore and a Fellow of the IEEE, National Academy of Inventors (NAI) and Asia-Pacific Artificial Intelligence Association (AAIA).
Rezensionen
"This impressive collection presents different viewpoints on the security of cyber-physical infrastructure. With more than 40 different contributors and 30 chapters organized in eight parts, the authors provide a unique introduction to the current state of the art in this field. The recent rise in both security awareness and the criticality of cyber-physical systems justifies the publishing of such a comprehensive book." --ComputingReviews.com, March 2013