Cantitate/Preț
Produs

Computer Security: Lecture Notes in Computer Science, cartea 10683

Editat de Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
en Limba Engleză Paperback – 22 dec 2017

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32194 lei

Preț vechi: 40243 lei
-20%

Puncte Express: 483

Carte tipărită la comandă

Livrare economică 20 mai-03 iunie


Specificații

ISBN-13: 9783319728162
ISBN-10: 3319728164
Pagini: 296
Ilustrații: XII, 281 p. 76 illus.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:1st edition 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Protecting Industrial Control and Cyber-Physical Systems.- Threats, Vulnerabilities and Risks.- Cyber Attacks in Industrial Control and Cyber-Physical Systems.- Detecting Attacks in Industrial Control and Cyber-Physical Systems.- Security and Privacy Requirements Assurance and Evaluation.- Security Requirements Elicitation and Modelling.