𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cyber-Physical Attacks: A Growing Invisible Threat

✍ Scribed by George Loukas


Publisher
Butterworth-Heinemann
Year
2015
Tongue
English
Leaves
265
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Cyber-Physical Attacks:Β A Growing Invisible ThreatΒ presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road,Β  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.

The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.

Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.

  • Demonstrates how to identify and protect against cyber-physical threats
  • Written for undergraduate students and non-experts, especially physical security professionals without computer science background
  • Suitable for training police and security professionals
  • Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectors
  • Includes online resources for those teaching security management

✦ Subjects


Network Security Networking Cloud Computing Computers Technology Encryption Cryptography Hacking Privacy Online Safety Certifications Viruses Computer Science New Used Rental Textbooks Specialty Boutique


πŸ“œ SIMILAR VOLUMES


Cyber-physical attacks: a growing invisi
✍ Loukas, George πŸ“‚ Library πŸ“… 2015 πŸ› Butterworth-Heinemann is an imprint of Elsevier 🌐 English

"Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are re

Cyber Threat!: How to Manage the Growing
✍ MacDonnell Ulsch πŸ“‚ Library πŸ“… 2014 πŸ› Wiley 🌐 English

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nations most highly respected

Cyber Threat!: How to Manage the Growing
✍ MacDonnell Ulsch πŸ“‚ Library πŸ“… 2014 πŸ› Wiley 🌐 English

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected

Understanding Cyber Threats and Attacks
✍ Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor) πŸ“‚ Library πŸ› Nova Science Pub Inc 🌐 English

<span>Nowadays, the Internet has become all pervasive in the daily life around the world, transforming the old telephone set into a small multipurpose computer. Consequently, human life has radically changed. Our dependence on computer networks became undeniable and together with it, harmful program

Collaborative cyber threat intelligence
✍ Florian Skopik πŸ“‚ Library πŸ“… 2018 πŸ› Auerbach Publications;CRC Press 🌐 English

<P>Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to si