語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity for reconfigurable hardware based critical infrastructures
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybersecurity for reconfigurable hardware based critical infrastructures/ by Krishnendu Guha, Jyoti Prakash Singh, Amlan Chakrabarti.
作者:
Guha, Krishnendu.
其他作者:
Singh, Jyoti Prakash.
出版者:
Cham :Springer International Publishing : : 2024.,
面頁冊數:
xvii, 198 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Adaptive computing systems - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-67591-1
ISBN:
9783031675911
Cybersecurity for reconfigurable hardware based critical infrastructures
Guha, Krishnendu.
Cybersecurity for reconfigurable hardware based critical infrastructures
[electronic resource] /by Krishnendu Guha, Jyoti Prakash Singh, Amlan Chakrabarti. - Cham :Springer International Publishing :2024. - xvii, 198 p. :ill. (chiefly color), digital ;24 cm.
Introduction -- Reconfigurable Hardware -- Security Administration & Planning -- Auditing -- Monitoring & Analysis -- Risk, Response and Recovery -- Control and Countermeasures -- AI/ML in Cyber-Security -- Digital Forensics -- Tutorial for Hands on Reconfigurable Hardware: System Design, Attacks, Security.
The book commences with an introductory section on reconfigurable computing and thereafter delves into its applications in critical infrastructures. This book analyzes how such systems may be affected due to vulnerabilities and also discusses how these can be attacked by adversaries or cybercriminals. This book also discusses protection mechanisms related to such threats. It initially starts with an introduction to the various industrial revolutions and the changes in security needs, followed by a basic description of reconfigurable hardware based critical infrastructures. Further, the book contains discussion on security administration and planning, auditing, monitoring and analysis, risk-response and recovery, control and countermeasures highlighting their need in reconfigurable hardware-based platforms. In addition to these, new concepts are introduced such as AI/ML for cybersecurity, digital forensics related to reconfigurable hardware based critical infrastructures. Finally, a hands on learning experience is presented to provide the readers with a practical flavour. The book will be useful to students (graduate and undergraduate), researchers, academicians and industry professionals.
ISBN: 9783031675911
Standard No.: 10.1007/978-3-031-67591-1doiSubjects--Topical Terms:
1483046
Adaptive computing systems
--Security measures.
LC Class. No.: QA76.9.A3
Dewey Class. No.: 005.8
Cybersecurity for reconfigurable hardware based critical infrastructures
LDR
:02626nam a2200349 a 4500
001
1155119
003
DE-He213
005
20241003131204.0
006
m d
007
cr nn 008maaau
008
250619s2024 sz s 0 eng d
020
$a
9783031675911
$q
(electronic bk.)
020
$a
9783031675904
$q
(paper)
024
7
$a
10.1007/978-3-031-67591-1
$2
doi
035
$a
978-3-031-67591-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A3
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A3
$b
G942 2024
100
1
$a
Guha, Krishnendu.
$e
author.
$3
1351005
245
1 0
$a
Cybersecurity for reconfigurable hardware based critical infrastructures
$h
[electronic resource] /
$c
by Krishnendu Guha, Jyoti Prakash Singh, Amlan Chakrabarti.
260
$a
Cham :
$c
2024.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xvii, 198 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
505
0
$a
Introduction -- Reconfigurable Hardware -- Security Administration & Planning -- Auditing -- Monitoring & Analysis -- Risk, Response and Recovery -- Control and Countermeasures -- AI/ML in Cyber-Security -- Digital Forensics -- Tutorial for Hands on Reconfigurable Hardware: System Design, Attacks, Security.
520
$a
The book commences with an introductory section on reconfigurable computing and thereafter delves into its applications in critical infrastructures. This book analyzes how such systems may be affected due to vulnerabilities and also discusses how these can be attacked by adversaries or cybercriminals. This book also discusses protection mechanisms related to such threats. It initially starts with an introduction to the various industrial revolutions and the changes in security needs, followed by a basic description of reconfigurable hardware based critical infrastructures. Further, the book contains discussion on security administration and planning, auditing, monitoring and analysis, risk-response and recovery, control and countermeasures highlighting their need in reconfigurable hardware-based platforms. In addition to these, new concepts are introduced such as AI/ML for cybersecurity, digital forensics related to reconfigurable hardware based critical infrastructures. Finally, a hands on learning experience is presented to provide the readers with a practical flavour. The book will be useful to students (graduate and undergraduate), researchers, academicians and industry professionals.
650
0
$a
Adaptive computing systems
$x
Security measures.
$3
1483046
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Security Science and Technology.
$3
783419
700
1
$a
Singh, Jyoti Prakash.
$3
1202323
700
1
$a
Chakrabarti, Amlan.
$3
1117283
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-67591-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入