did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780124158153

Handbook on Securing Cyber-Physical Critical Infrastructure

by ; ;
  • ISBN13:

    9780124158153

  • ISBN10:

    0124158153

  • Format: Hardcover
  • Copyright: 2012-01-31
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $99.95 Save up to $0.50
  • Digital
    $112.44
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Author Biography

Sajal K. Das, University of Texas at Arlington Krishna Kant, George Mason University Nan Zhang, George Washington University

Table of Contents

About the Authorsp. vi
Contributorsp. xi
Forewordp. xvii
Securing Cyber-Physical Infrastructurep. xxi
Theoretical Foundations
Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approachp. 5
Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Modelsp. 31
An Analytical Framework for Cyber-Physical Networksp. 55
Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Applicationp. 73
Security for Wireless Mobile Networks
Mobile Wireless Network Securityp. 99
Robust Wireless Infrastructure against Jamming Attacksp. 123
Security for Mobile Ad Hoc Networksp. 147
Defending Against Identity-Based Attacks in Wireless Networksp. 191
Security for Sensor Networks
Efficient and Distributed Access Control for Sensor Networksp. 227
Defending Against Physical Attacks in Wireless Sensor Networksp. 251
Node Compromise Detection in Wireless Sensor Networksp. 281
Platform Security
Hardware and Security: Vulnerabilities and Solutionsp. 305
Languages and Security: Safer Software Through Language and Compiler Techniquesp. 333
Cloud Computing and Data Security
Protecting Data in Outsourcing Scenariosp. 361
Data Security in Cloud Computingp. 389
Secure Mobile Cloud Computingp. 411
Relation Privacy Preservation in Publishing Online Social Networksp. 431
Event Monitoring and Situation Awareness
Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructurep. 455
Discovering and Tracking Patterns of Interest in Security Sensor Streamsp. 481
Pervasive Sensing and Monitoring for Situational Awarenessp. 505
Sense and Response Systems for Crisis Managementp. 537
Policy Issues in Security Management
Managing and Securing Critical Infrastructure - A Semantic Policy- and Trust-Driven Approachp. 551
Policies, Access Control, and Formal Methodsp. 573
Formal Analysis of Policy-Based Security Configurations in Enterprise Networksp. 595
Security in Real-World Systems
Security and Privacy in the Smart Gridp. 637
Cyber-Physical Security of Automotive Information Technologyp. 655
Security and Privacy for Mobile Health-Care (m-Health) Systemsp. 677
Security and Robustness in the Internet Infrastructurep. 705
Emergency Vehicular Networksp. 735
Security Issues in VoIP Telecommunication Networksp. 763
Indexp. 791
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program