Safe and secure cyber-physical systems and Internet-of-Things systems /

Saved in:
Bibliographic Details
Author / Creator:Wolf, Marilyn, 1958- author.
Imprint:Cham, Switzerland : Springer, [2020]
Description:1 online resource (x, 91 pages) : illustrations (some color)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12602145
Hidden Bibliographic Details
Other authors / contributors:Serpanos, Dimitrios Nikolaou, author.
ISBN:3030258084
9783030258085
9783030258078
3030258076
9783030258078
9783030258092
3030258092
9783030258108
3030258106
Digital file characteristics:text file PDF
Notes:Includes bibliographical references and index.
Description based on online resource; title from digital title page (viewed on November 14, 2019).
Summary:This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges; Provides a detailed comparison of safety and security methodologies; Describes a comprehensive threat model including attacks, design errors, and faults; Identifies important commonalities and differences in safety and security engineering.
Other form:3030258076
Standard no.:10.1007/978-3-030-25808-5
10.1007/978-3-030-25

MARC

LEADER 00000cam a2200000Ii 4500
001 12602145
005 20210813213023.0
006 m o d
007 cr cnu|||unuuu
008 191002s2020 sz a ob 001 0 eng d
015 |a GBB9G9516  |2 bnb 
016 7 |a 019556314  |2 Uk 
019 |a 1121273658  |a 1125787569  |a 1136244531  |a 1156073543  |a 1156354182  |a 1161325833  |a 1162786066  |a 1203982440 
020 |a 3030258084  |q electronic book 
020 |a 9783030258085  |q (electronic bk.) 
020 |z 9783030258078 
020 |a 3030258076 
020 |a 9783030258078 
020 |a 9783030258092  |q (print) 
020 |a 3030258092 
020 |a 9783030258108  |q (print) 
020 |a 3030258106 
024 7 |a 10.1007/978-3-030-25808-5  |2 doi 
024 8 |a 10.1007/978-3-030-25 
035 |a (OCoLC)1121476539  |z (OCoLC)1121273658  |z (OCoLC)1125787569  |z (OCoLC)1136244531  |z (OCoLC)1156073543  |z (OCoLC)1156354182  |z (OCoLC)1161325833  |z (OCoLC)1162786066  |z (OCoLC)1203982440 
035 9 |a (OCLCCM-CC)1121476539 
037 |a com.springer.onix.9783030258085  |b Springer Nature 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d LQU  |d UKMGB  |d SFB  |d OCLCF  |d YDXIT  |d YDX  |d N$T  |d WAU  |d VT2 
049 |a MAIN 
050 4 |a QA76.9.A25  |b W65 2020 
072 7 |a TJFC  |2 bicssc 
072 7 |a TEC008010  |2 bisacsh 
072 7 |a TJFC  |2 thema 
100 1 |a Wolf, Marilyn,  |d 1958-  |e author.  |0 http://id.loc.gov/authorities/names/n2006056178 
245 1 0 |a Safe and secure cyber-physical systems and Internet-of-Things systems /  |c Marilyn Wolf, Dimitrios Serpanos. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2020] 
300 |a 1 online resource (x, 91 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
504 |a Includes bibliographical references and index. 
520 |a This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people. Offers readers a unified view of safety and security, from basic concepts through research challenges; Provides a detailed comparison of safety and security methodologies; Describes a comprehensive threat model including attacks, design errors, and faults; Identifies important commonalities and differences in safety and security engineering. 
505 0 |a Chapter 1. The Safety and Security Landscape -- Chapter 2.Safety and Security Design Processes -- Chapter 3.Threats and Threat Analysis -- Chapter 4.Architectures -- Chapter 5. Security Testing and Runtime Monitoring -- Chapter 6. False Data Injection Attacks. 
588 |a Description based on online resource; title from digital title page (viewed on November 14, 2019). 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Cooperating objects (Computer systems)  |0 http://id.loc.gov/authorities/subjects/sh2012002854 
650 0 |a Internet of things.  |0 http://id.loc.gov/authorities/subjects/sh2013000266 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cooperating objects (Computer systems)  |2 fast  |0 (OCoLC)fst01893355 
650 7 |a Internet of things.  |2 fast  |0 (OCoLC)fst01894151 
655 4 |a Electronic books. 
700 1 |a Serpanos, Dimitrios Nikolaou,  |e author.  |0 http://id.loc.gov/authorities/names/nr90015408 
776 0 |z 3030258076 
903 |a HeVa 
929 |a oclccm 
999 f f |i 5349e250-dfb5-5597-868d-9e89906cb89a  |s 2c99814e-a857-542b-be82-47c916e5657e 
928 |t Library of Congress classification  |a QA76.9.A25 W65 2020  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-25808-5  |z Springer Nature  |g ebooks  |i 12617752