Handbook on securing cyber-physical critical infrastructure
I tiakina i:
Kaituhi rangatōpū: | |
---|---|
Ētahi atu kaituhi: | , , |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Waltham, Mass. :
Elsevier/Morgan Kaufmann,
2012.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- pt. 1. Theoretical foundations
- pt. 2. Security for wireless mobile networks
- pt. 3. Security for sensor networks
- pt. 4. Platform secruity
- pt. 5. Cloud computing and data security
- pt. 6. Event monitoring and situation awareness
- pt. 7. Policy issues in security management
- pt. 8. Security in real-world systems.