找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber-Physical Security; Protecting Critical Robert M. Clark,Simon Hakim Book 2017 Springer International Publishing Switzerland 2017 crit

[复制链接]
查看: 48546|回复: 58
发表于 2025-3-21 19:50:56 | 显示全部楼层 |阅读模式
书目名称Cyber-Physical Security
副标题Protecting Critical
编辑Robert M. Clark,Simon Hakim
视频video
概述Contains examples of the cyber-security issues facing local governmental units worldwide and examples of effective techniques that can be used to deal with these problems.Written and edited by leading
丛书名称Protecting Critical Infrastructure
图书封面Titlebook: Cyber-Physical Security; Protecting Critical  Robert M. Clark,Simon Hakim Book 2017 Springer International Publishing Switzerland 2017 crit
描述This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others.  Cyber-attacks might include denial of service, theft or manipulation of data.  Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens.  Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government.  Little attention has been paid to cyber-security at the state and local level.  However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste
出版日期Book 2017
关键词critical infrastructure; cyber security; cyber threat; cyber-attack; cyber-terrorism; water quality and w
版次1
doihttps://doi.org/10.1007/978-3-319-32824-9
isbn_softcover978-3-319-81375-2
isbn_ebook978-3-319-32824-9Series ISSN 2512-1790 Series E-ISSN 2512-1804
issn_series 2512-1790
copyrightSpringer International Publishing Switzerland 2017
The information of publication is updating

书目名称Cyber-Physical Security影响因子(影响力)




书目名称Cyber-Physical Security影响因子(影响力)学科排名




书目名称Cyber-Physical Security网络公开度




书目名称Cyber-Physical Security网络公开度学科排名




书目名称Cyber-Physical Security被引频次




书目名称Cyber-Physical Security被引频次学科排名




书目名称Cyber-Physical Security年度引用




书目名称Cyber-Physical Security年度引用学科排名




书目名称Cyber-Physical Security读者反馈




书目名称Cyber-Physical Security读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:59:16 | 显示全部楼层
Robert M. Clark,Simon HakimContains examples of the cyber-security issues facing local governmental units worldwide and examples of effective techniques that can be used to deal with these problems.Written and edited by leading
发表于 2025-3-22 04:13:26 | 显示全部楼层
发表于 2025-3-22 06:55:35 | 显示全部楼层
发表于 2025-3-22 10:49:04 | 显示全部楼层
https://doi.org/10.1007/978-1-4302-0001-7erstood in the context of cybersecurity. In order to develop and implement an effective cybersecurity program, it is necessary to understand the terminology and its contextual use. Cybersecurity programs often evolve within an organization and, depending on the history of that evolution, the impleme
发表于 2025-3-22 13:11:15 | 显示全部楼层
Configuration and Customization,k our digital infrastructure with the intent of undermining our security and economic prosperity. Vigilance, constant and unwavering, is the price all municipalities must pay to keep their cyber infrastructure safe from those who would use violence, or the threat of violence, theft, or vandalism to
发表于 2025-3-22 20:34:56 | 显示全部楼层
Content Negotiation and Media Types,tric generation, transmission, and distribution systems, manufacturing systems, as well as petrochemical pipelines and many other industrial processes. Today, control system networks employ conventional computing hardware and software products extensively, but the similarity between control systems
发表于 2025-3-22 21:58:57 | 显示全部楼层
发表于 2025-3-23 04:01:36 | 显示全部楼层
https://doi.org/10.1007/978-3-642-73015-3nfrastructure that support this trade are increasingly dependent on cyber technology. Cyber incidents involving navigation, cargo control, and other industrial processes could threaten lives, the environment, property, and could significantly disrupt regular trade activity. The U.S. Coast Guard, wit
发表于 2025-3-23 09:34:10 | 显示全部楼层
https://doi.org/10.1007/978-3-642-76062-4ucture. The EPA has determined that a voluntary approach to cyber security is sufficient for protecting critical infrastructure in this sector. Also, the EPA is in collaborative partnership with the Department of Homeland Security (DHS) to ensure cyber security in this sector. In 2014, the DHS respo
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 16:09
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表