LEADER 01057nam0-2200289 --450 001 9910637990003321 005 20230120152405.0 017 70$a594739$2U 020 $aIT$b1911 989 100 $a20230120d1910----kmuy0itay5050 ba 101 1 $aita 102 $aIT 105 $a 001yy 200 1 $aNatura e competenza della sezione della Giunta del Consiglio superiore per l'istruzione media, come organo di giustizia amministrativa$fManfredo Tovajera 210 $aMilano$cSocietā Editrice Libraria$dstampa 1910 215 $a17 p.$d26 cm 300 $aPaginato anche 509-522 300 $aEstr.da: Rivista di diritto pubblico, n. 10-11, pt. 2 (1910). 676 $a351$v23$zita 700 1$aTovajera,$bManfredo$057180 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910637990003321 952 $aBusta 12 (10), 3$b32719$fFGBC 959 $aFGBC 996 $aNatura e competenza della sezione della Giunta del Consiglio superiore per l'istruzione media, come organo di giustizia amministrativa$93002523 997 $aUNINA LEADER 03500nam 22006255 450 001 9910896189603321 005 20250807133252.0 010 $a3-031-67591-6 024 7 $a10.1007/978-3-031-67591-1 035 $a(MiAaPQ)EBC31707533 035 $a(Au-PeEL)EBL31707533 035 $a(CKB)36284143700041 035 $a(DE-He213)978-3-031-67591-1 035 $a(EXLCZ)9936284143700041 100 $a20241003d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity for Reconfigurable Hardware Based Critical Infrastructures /$fby Krishnendu Guha, Jyoti Prakash Singh, Amlan Chakrabarti 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (212 pages) 311 08$a3-031-67590-8 320 $aIncludes bibliographical references. 327 $aIntroduction -- Reconfigurable Hardware -- Security Administration & Planning -- Auditing -- Monitoring & Analysis -- Risk, Response and Recovery -- Control and Countermeasures -- AI/ML in Cyber-Security -- Digital Forensics -- Tutorial for Hands on Reconfigurable Hardware: System Design, Attacks, Security. 330 $aThe book commences with an introductory section on reconfigurable computing and thereafter delves into its applications in critical infrastructures. This book analyzes how such systems may be affected due to vulnerabilities and also discusses how these can be attacked by adversaries or cybercriminals. This book also discusses protection mechanisms related to such threats. It initially starts with an introduction to the various industrial revolutions and the changes in security needs, followed by a basic description of reconfigurable hardware based critical infrastructures. Further, the book contains discussion on security administration and planning, auditing, monitoring and analysis, risk-response and recovery, control and countermeasures highlighting their need in reconfigurable hardware-based platforms. In addition to these, new concepts are introduced such as AI/ML for cybersecurity, digital forensics related to reconfigurable hardware based critical infrastructures. Finally, a hands on learning experience is presented to provide the readers with a practical flavour. The book will be useful to students (graduate and undergraduate), researchers, academicians and industry professionals. 606 $aData protection 606 $aCooperating objects (Computer systems) 606 $aComputer crimes 606 $aSecurity systems 606 $aData and Information Security 606 $aCyber-Physical Systems 606 $aCybercrime 606 $aSecurity Science and Technology 615 0$aData protection. 615 0$aCooperating objects (Computer systems) 615 0$aComputer crimes. 615 0$aSecurity systems. 615 14$aData and Information Security. 615 24$aCyber-Physical Systems. 615 24$aCybercrime. 615 24$aSecurity Science and Technology. 676 $a621.395 700 $aGuha$b Krishnendu$01069171 702 $aSingh$b Jyoti Prakash 702 $aChakrabarti$b Amlan 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910896189603321 996 $aCybersecurity for Reconfigurable Hardware Based Critical Infrastructures$94430508 997 $aUNINA