Handbook on securing cyber-physical critical infrastructure

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Das, Sajal K., Kant, Krishna, Zhang, Nan, 1982-
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Waltham, Mass. : Elsevier/Morgan Kaufmann, 2012.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • pt. 1. Theoretical foundations
  • pt. 2. Security for wireless mobile networks
  • pt. 3. Security for sensor networks
  • pt. 4. Platform secruity
  • pt. 5. Cloud computing and data security
  • pt. 6. Event monitoring and situation awareness
  • pt. 7. Policy issues in security management
  • pt. 8. Security in real-world systems.