語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Security = Critical Infrastructure Protection /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Security/ edited by Martti Lehto, Pekka Neittaanmäki.
其他題名:
Critical Infrastructure Protection /
其他作者:
Neittaanmäki, Pekka.
面頁冊數:
XVI, 484 p. 73 illus., 63 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Cyber-Physical Systems. -
電子資源:
https://doi.org/10.1007/978-3-030-91293-2
ISBN:
9783030912932
Cyber Security = Critical Infrastructure Protection /
Cyber Security
Critical Infrastructure Protection /[electronic resource] :edited by Martti Lehto, Pekka Neittaanmäki. - 1st ed. 2022. - XVI, 484 p. 73 illus., 63 illus. in color.online resource. - Computational Methods in Applied Sciences,562543-0203 ;. - Computational Methods in Applied Sciences,36.
Part I: Digital society. Chapter 1: Cyber-attacks Against Critical Infrastructure -- Chapter 2: Key Elements of On-line Cyber Security Exercise and Survey of Learning During the On-line Cyber Security Exercise -- Chapter 3: Cyber Law and Regulation -- Chapter 4: Understanding and Gaining Human Resilience Against Negative Effects of Digitalization -- Chapter 5: Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior -- Chapter 6: Process Ontology Approach to Military Influence Operations -- Part II: Critical infrastructure protection. Chapter 7: Future Smart Societies’ Infrastructures and Services in the Cyber Environments -- Chapter 8: Cyber Security in Healthcare Systems -- Chapter 9: Cyber Security of an Electric Power System in Critical Infrastructure -- Chapter 10: Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor.
This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.
ISBN: 9783030912932
Standard No.: 10.1007/978-3-030-91293-2doiSubjects--Topical Terms:
1387591
Cyber-Physical Systems.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber Security = Critical Infrastructure Protection /
LDR
:03492nam a22004335i 4500
001
1092097
003
DE-He213
005
20220402133712.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030912932
$9
978-3-030-91293-2
024
7
$a
10.1007/978-3-030-91293-2
$2
doi
035
$a
978-3-030-91293-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Cyber Security
$h
[electronic resource] :
$b
Critical Infrastructure Protection /
$c
edited by Martti Lehto, Pekka Neittaanmäki.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XVI, 484 p. 73 illus., 63 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computational Methods in Applied Sciences,
$x
2543-0203 ;
$v
56
505
0
$a
Part I: Digital society. Chapter 1: Cyber-attacks Against Critical Infrastructure -- Chapter 2: Key Elements of On-line Cyber Security Exercise and Survey of Learning During the On-line Cyber Security Exercise -- Chapter 3: Cyber Law and Regulation -- Chapter 4: Understanding and Gaining Human Resilience Against Negative Effects of Digitalization -- Chapter 5: Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior -- Chapter 6: Process Ontology Approach to Military Influence Operations -- Part II: Critical infrastructure protection. Chapter 7: Future Smart Societies’ Infrastructures and Services in the Cyber Environments -- Chapter 8: Cyber Security in Healthcare Systems -- Chapter 9: Cyber Security of an Electric Power System in Critical Infrastructure -- Chapter 10: Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor.
520
$a
This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Cybercrime.
$3
1109747
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Cooperating objects (Computer systems).
$3
1387590
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Data protection.
$3
557764
700
1
$a
Neittaanmäki, Pekka.
$e
author.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1261255
700
1
$a
Lehto, Martti.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1204819
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030912925
776
0 8
$i
Printed edition:
$z
9783030912949
776
0 8
$i
Printed edition:
$z
9783030912956
830
0
$a
Computational Methods in Applied Sciences,
$x
1871-3033 ;
$v
36
$3
1254850
856
4 0
$u
https://doi.org/10.1007/978-3-030-91293-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入