skip to content
Handbook on securing cyber-physical critical infrastructure : foundation and challenges Preview this item
ClosePreview this item
Checking...

Handbook on securing cyber-physical critical infrastructure : foundation and challenges

Author: Sajal K Das; Krishna Kant; Nan Zhang
Publisher: Waltham, MA : Morgan Kaufmann, ©2012.
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Summary:

Introduces the theoretical foundations and solution techniques for securing critical cyber and physical infrastructures and their underlying computing and communication architectures and systems.  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Handbooks and manuals
Handbooks, manuals, etc
Document Type: Book
All Authors / Contributors: Sajal K Das; Krishna Kant; Nan Zhang
ISBN: 9780124158153 0124158153
OCLC Number: 745980948
Description: xxx, 816 pages : illustrations ; 25 cm
Contents: Machine generated contents note: pt. I Theoretical Foundations --
1. Security and Vulnerability of Cyber-Physical infrastructure Networks: A Control-Theoretic Approach / Sajal K. Das --
2. Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models / Sajal K. Das --
3. An Analytical Framework for Cyber-Physical Networks / Chris Y.T. Ma --
4. Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Application / Brian Rivera --
pt. II Security for Wireless Mobile Networks --
5. Mobile Wireless Network Security / Michel Barbeau --
6. Robust Wireless Infrastructure against Jamming Attacks / Guevara Noubir --
7. Security for Mobile Ad Hoc Networks / Ningrinla Marchang --
8. Defending Against Identity-Based Attacks in Wireless Networks / Jie Yang --
pt. III Security for Sensor Networks --
9. Efficient and Distributed Access Control for Sensor Networks / Donggang Liu --
10. Defending Against Physical Attacks in Wireless Sensor Networks / Dong Xuan --
11. Node Compromise Detection in Wireless Sensor Networks / Sajal K. Das --
pt. IV Platform Security --
12. Hardware and Security: Vulnerabilities and Solutions / Rahul Simha --
13. Languages and Security: Safer Software Through Language and Compiler Techniques / Scotty Smith --
pt. V Cloud Computing and Data Security --
14. Protecting Data in Outsourcing Scenarios / Pierangela Samarati --
15. Data Security in Cloud Computing / Kui Ren --
16. Secure Mobile Cloud Computing / Sajal K. Das --
17. Relation Privacy Preservation in Publishing Online Social Networks / Sajal K. Das --
pt. VI Event Monitoring and Situation Awareness --
18. Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure / Yong Guan --
19. Discovering and Tracking Patterns of Interest in Security Sensor Streams / Diane J. Cook --
20. Pervasive Sensing and Monitoring for Situational Awareness / Carolyn Talcott --
21. Sense and Response Systems for Crisis Management / M. Olson --
pt. VII Policy Issues in Security Management --
22. Managing and Securing Critical Infrastructure --
A Semantic Policy- and Trust-Driven Approach / Tim Finin --
23. Policies, Access Control, and Formal Methods / Elisa Bertino --
24. Formal Analysis of Policy-Based Security Configurations in Enterprise Networks / P. Bera --
pt. VIII Security in Real-World Systems --
25. Security and Privacy in the Smart Grid / Reihaneh Safavi-Naini --
26. Cyber-Physical Security of Automotive Information Technology / Juan Deng --
27. Security and Privacy for Mobile Health-Care (m-Health) Systems / Yuguang Fang --
28. Security and Robustness in the Internet Infrastructure / Casey Deccio --
29. Emergency Vehicular Networks / Giovanni Pau --
30. Security Issues in VoIP Telecommunication Networks / Duminda Wijesekera.
Responsibility: Sajal Das, Krishna Kant, Nan Zhang (editors).

Reviews

Editorial reviews

Publisher Synopsis

"This impressive collection presents different viewpoints on the security of cyber-physical infrastructure. With more than 40 different contributors and 30 chapters organized in eight parts, the Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/745980948> # Handbook on securing cyber-physical critical infrastructure : foundation and challenges
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "745980948" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1107898365#Place/waltham_ma> ; # Waltham, MA
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh90001862> ; # Computer security
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/186992817> ; # Nan Zhang
   schema:contributor <http://viaf.org/viaf/28005438> ; # Sajal K. Das
   schema:contributor <http://viaf.org/viaf/43432481> ; # Krishna Kant
   schema:copyrightYear "2012" ;
   schema:datePublished "2012" ;
   schema:description "Machine generated contents note: pt. I Theoretical Foundations -- 1. Security and Vulnerability of Cyber-Physical infrastructure Networks: A Control-Theoretic Approach / Sajal K. Das -- 2. Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models / Sajal K. Das -- 3. An Analytical Framework for Cyber-Physical Networks / Chris Y.T. Ma -- 4. Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Application / Brian Rivera -- pt. II Security for Wireless Mobile Networks -- 5. Mobile Wireless Network Security / Michel Barbeau -- 6. Robust Wireless Infrastructure against Jamming Attacks / Guevara Noubir -- 7. Security for Mobile Ad Hoc Networks / Ningrinla Marchang -- 8. Defending Against Identity-Based Attacks in Wireless Networks / Jie Yang -- pt. III Security for Sensor Networks -- 9. Efficient and Distributed Access Control for Sensor Networks / Donggang Liu -- 10. Defending Against Physical Attacks in Wireless Sensor Networks / Dong Xuan -- 11. Node Compromise Detection in Wireless Sensor Networks / Sajal K. Das -- pt. IV Platform Security -- 12. Hardware and Security: Vulnerabilities and Solutions / Rahul Simha -- 13. Languages and Security: Safer Software Through Language and Compiler Techniques / Scotty Smith -- pt. V Cloud Computing and Data Security -- 14. Protecting Data in Outsourcing Scenarios / Pierangela Samarati -- 15. Data Security in Cloud Computing / Kui Ren -- 16. Secure Mobile Cloud Computing / Sajal K. Das -- 17. Relation Privacy Preservation in Publishing Online Social Networks / Sajal K. Das -- pt. VI Event Monitoring and Situation Awareness -- 18. Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure / Yong Guan -- 19. Discovering and Tracking Patterns of Interest in Security Sensor Streams / Diane J. Cook -- 20. Pervasive Sensing and Monitoring for Situational Awareness / Carolyn Talcott -- 21. Sense and Response Systems for Crisis Management / M. Olson -- pt. VII Policy Issues in Security Management -- 22. Managing and Securing Critical Infrastructure -- A Semantic Policy- and Trust-Driven Approach / Tim Finin -- 23. Policies, Access Control, and Formal Methods / Elisa Bertino -- 24. Formal Analysis of Policy-Based Security Configurations in Enterprise Networks / P. Bera -- pt. VIII Security in Real-World Systems -- 25. Security and Privacy in the Smart Grid / Reihaneh Safavi-Naini -- 26. Cyber-Physical Security of Automotive Information Technology / Juan Deng -- 27. Security and Privacy for Mobile Health-Care (m-Health) Systems / Yuguang Fang -- 28. Security and Robustness in the Internet Infrastructure / Casey Deccio -- 29. Emergency Vehicular Networks / Giovanni Pau -- 30. Security Issues in VoIP Telecommunication Networks / Duminda Wijesekera."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1107898365> ;
   schema:genre "Handbooks and manuals"@en ;
   schema:inLanguage "en" ;
   schema:name "Handbook on securing cyber-physical critical infrastructure : foundation and challenges"@en ;
   schema:productID "745980948" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/745980948#PublicationEvent/waltham_ma_morgan_kaufmann_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1107898365#Agent/morgan_kaufmann> ; # Morgan Kaufmann
   schema:workExample <http://worldcat.org/isbn/9780124158153> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/745980948> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1107898365#Agent/morgan_kaufmann> # Morgan Kaufmann
    a bgn:Agent ;
   schema:name "Morgan Kaufmann" ;
    .

<http://id.loc.gov/authorities/subjects/sh90001862> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/186992817> # Nan Zhang
    a schema:Person ;
   schema:birthDate "1982" ;
   schema:familyName "Zhang" ;
   schema:givenName "Nan" ;
   schema:name "Nan Zhang" ;
    .

<http://viaf.org/viaf/28005438> # Sajal K. Das
    a schema:Person ;
   schema:familyName "Das" ;
   schema:givenName "Sajal K." ;
   schema:name "Sajal K. Das" ;
    .

<http://viaf.org/viaf/43432481> # Krishna Kant
    a schema:Person ;
   schema:familyName "Kant" ;
   schema:givenName "Krishna" ;
   schema:name "Krishna Kant" ;
    .

<http://worldcat.org/isbn/9780124158153>
    a schema:ProductModel ;
   schema:isbn "0124158153" ;
   schema:isbn "9780124158153" ;
    .

<http://www.worldcat.org/title/-/oclc/745980948>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/745980948> ; # Handbook on securing cyber-physical critical infrastructure : foundation and challenges
   schema:dateModified "2017-09-03" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.