語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber resilience system engineering empowered by endogenous security and safety
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber resilience system engineering empowered by endogenous security and safety/ by Jiangxing Wu.
作者:
Wu, Jiangxing.
出版者:
Singapore :Springer Nature Singapore : : 2024.,
面頁冊數:
xxxviii, 501 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Cryptology. -
電子資源:
https://doi.org/10.1007/978-981-97-0116-2
ISBN:
9789819701162
Cyber resilience system engineering empowered by endogenous security and safety
Wu, Jiangxing.
Cyber resilience system engineering empowered by endogenous security and safety
[electronic resource] /by Jiangxing Wu. - Singapore :Springer Nature Singapore :2024. - xxxviii, 501 p. :ill. (chiefly color), digital ;24 cm.
Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures. This book analyses the systematic security gains that DHR architecture enabling network resilience engineering can bring in the four purpose dimensions of prevention, defense, recovery and adaptation; gives an application example of DHR endogenous security and safety architecture enabling network resilience engineering; introduces the research and exploration of endogenous security and safety theory in wireless communication security, artificial intelligence security and other derivative application fields; and uses rich application examples. It shows that the endogenous security and safety architecture enabling network resilience engineering not only is very necessary but also has universal application significance. This book is suitable for postgraduate teaching materials or reference books of related disciplines, such as cybersecurity, network resilience engineering, confidential computing/trusted computing, information physical systems/industrial control, etc.
ISBN: 9789819701162
Standard No.: 10.1007/978-981-97-0116-2doiSubjects--Topical Terms:
1211076
Cryptology.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber resilience system engineering empowered by endogenous security and safety
LDR
:03260nam a2200325 a 4500
001
1138633
003
DE-He213
005
20241029115417.0
006
m d
007
cr nn 008maaau
008
250117s2024 si s 0 eng d
020
$a
9789819701162
$q
(electronic bk.)
020
$a
9789819701155
$q
(paper)
024
7
$a
10.1007/978-981-97-0116-2
$2
doi
035
$a
978-981-97-0116-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W959 2024
100
1
$a
Wu, Jiangxing.
$e
author.
$3
1323386
245
1 0
$a
Cyber resilience system engineering empowered by endogenous security and safety
$h
[electronic resource] /
$c
by Jiangxing Wu.
260
$a
Singapore :
$c
2024.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xxxviii, 501 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
505
0
$a
Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix.
520
$a
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures. This book analyses the systematic security gains that DHR architecture enabling network resilience engineering can bring in the four purpose dimensions of prevention, defense, recovery and adaptation; gives an application example of DHR endogenous security and safety architecture enabling network resilience engineering; introduces the research and exploration of endogenous security and safety theory in wireless communication security, artificial intelligence security and other derivative application fields; and uses rich application examples. It shows that the endogenous security and safety architecture enabling network resilience engineering not only is very necessary but also has universal application significance. This book is suitable for postgraduate teaching materials or reference books of related disciplines, such as cybersecurity, network resilience engineering, confidential computing/trusted computing, information physical systems/industrial control, etc.
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Principles and Models of Security.
$3
1225876
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
0
$a
Computer architecture.
$3
528145
650
0
$a
Computer security.
$3
557122
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-981-97-0116-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入