Information security of highly critical wireless networks /
Saved in:
Author / Creator: | Martellini, M. (Maurizio), author. |
---|---|
Imprint: | Cham, Switzerland : Springer, 2017. |
Description: | 1 online resource |
Language: | English |
Series: | SpringerBriefs in computer science, 2191-5768 SpringerBriefs in computer science. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11271690 |
Table of Contents:
- 1 Introduction
- 2 What Is Highly Critical Wireless Networking (HCWN)
- 3 Applications for HCWN
- 4 Vulnerabilities and Security Issues
- 5 Modeling Threats and Risks
- 6 Modeling Vulnerabilities
- 7 Governance and Management Frameworks
- 8 Security Technologies for Networked Devices
- 9 Known Weaknesses with Security Controls
- 10 Competent Reliable Operation of HCWN
- 11 Assessing the Effectiveness and Efficiency of Security Approaches
- 12 Examples in Brief
- 13 Testing the Resilience of HCWN
- 14 Future Attack Patterns
- 15 Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution
- 16 Conclusion.