Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical Infrastructure
Author: Sajal K Das
Publisher: Elsevier
Total Pages: 849
Release: 2012-01-25
Genre: Computers
ISBN: 0124159109

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. - Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios - Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on - Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Computer Law and Software Protection

Computer Law and Software Protection
Author:
Publisher:
Total Pages: 294
Release: 1993
Genre: Language Arts & Disciplines
ISBN:

Advancing technology has spawned a continued increase in computer crime, from viruses to security problems. Over 3,000 entries from books, periodicals, technical reports, legal cases, panels, symposia and a wide array of U.S. government documents on issues in this evergrowing area are included here. Thoroughly indexed.

The Little Black Book of Computer Viruses

The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher:
Total Pages: 168
Release: 2016-11-06
Genre:
ISBN: 9781365511301

The Little Black Book has not been without its dangers. The Stealth virus described in its pages has succeeded in establishing itself in the wild, and, as of the date of this writing it is #8 on the annual frequency list, which is a concatenation of the most frequently found viruses in the wild.

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology
Author: Phillip A. Laplante
Publisher: CRC Press
Total Pages: 1966
Release: 2017-10-02
Genre: Computers
ISBN: 135164579X

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include: General and reference Hardware Computer systems organization Networks Software and its engineering Theory of computation Mathematics of computing Information systems Security and privacy Human-centered computing Computing methodologies Applied computing Professional issues Leading figures in the history of computer science The encyclopedia is structured according to the ACM Computing Classification System (CCS), first published in 1988 but subsequently revised in 2012. This classification system is the most comprehensive and is considered the de facto ontological framework for the computing field. The encyclopedia brings together the information and historical context that students, practicing professionals, researchers, and academicians need to have a strong and solid foundation in all aspects of computer science and technology.