top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Infrastructure Protection VIII [[electronic resource] ] : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers / / edited by Jonathan Butts, Sujeet Shenoi
Critical Infrastructure Protection VIII [[electronic resource] ] : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers / / edited by Jonathan Butts, Sujeet Shenoi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 276 p. 86 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Management information systems
Computer science
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Management of Computing and Information Systems
Legal Aspects of Computing
Computers and Society
ISBN 3-662-45355-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Detecting Integrity Attacks on Industrial Control Systems -- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process Control Systems -- Recovery of Structural Controllability for Control Systems -- Industrial Control System Traffic Data Sets for Intrusion Detection Research -- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation -- Evidence Theory for Cyber-Physical Systems -- An Automated Dialog System for Conducting Security Interviews for Access Control -- A Survey of Critical Infrastructure Security -- A System Dynamics Framework for Modeling Critical Infrastructure Resilience -- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation -- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery -- A Decision Support Tool for a Unified Homeland Security Strategy -- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems -- Assessing Potential Casualties in Critical Events -- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection -- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Record Nr. UNINA-9910298968203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection X : 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers / / edited by Mason Rice, Sujeet Shenoi
Critical Infrastructure Protection X : 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers / / edited by Mason Rice, Sujeet Shenoi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIV, 255 p. 62 illus.)
Disciplina 658.478
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Electronic data processing - Management
Computers - Law and legislation
Information technology - Law and legislation
Computers and civilization
Computer simulation
Data and Information Security
IT Operations
Legal Aspects of Computing
Computers and Society
Computer Modelling
ISBN 3-319-48737-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910255004403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 306 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computers and civilization
Data mining
Data and Information Security
Legal Aspects of Computing
Computers and Society
Data Mining and Knowledge Discovery
ISBN 3-030-04537-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910303450703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 328 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer networks
Software engineering
Application software
Data and Information Security
Legal Aspects of Computing
Computer Communication Networks
Software Engineering
Computer and Information Systems Applications
ISBN 3-030-34647-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910357849303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 331 p. 112 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Application software
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer and Information Systems Applications
Computer Communication Networks
Legal Aspects of Computing
ISBN 3-030-62840-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Record Nr. UNINA-9910447243003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (303 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-20137-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure -- 4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation -- 3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance -- 4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements.
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments.
6.3 Infill Exclusion Experiments -- 6.4 Discussion -- 7. Mitigations -- 8. Conclusions -- Acknowledgement -- References -- Chapter 7 DETECTING PART ANOMALIES INDUCED BY CYBER ATTACKS ON A POWDER BED FUSION ADDITIVE MANUFACTURING SYSTEM -- 1. Introduction -- 2. Related Work -- 3. Powder Bed Fusion -- 3.1 Powder Bed Fusion Process -- 3.2 Selective Laser Sintering Printer -- 4. Powder Bed Fusion Printer Anomalies -- 5. Anomaly Detection Method -- 5.1 Data Collection -- 5.2 Data Processing -- 5.3 Data Analysis -- 6. Anomaly Creation Attacks -- 7. Experimental Setup and Results -- 7.1 Experimental Setup -- 7.2 Anomaly Detection Results -- 8. Discussion -- 9. Conclusions -- Acknowledgement -- References -- Chapter 8 LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS -- 1. Introduction -- 2. Related Work -- 3. Low-Magnitude Infill Structure Attacks -- 3.1 Attack Success Criteria -- 3.2 Printing Accuracy -- 3.3 Attacking Infill Structures -- 4. Attack Implementation -- 4.1 Attack Overview -- 4.2 Attack Plan -- 5. Evaluation Results -- 5.1 Stealthiness Performance -- 5.2 Mechanical Strength Impacts -- 6. Analysis and Discussion -- 7. Attack Countermeasures -- 8. Conclusions -- Acknowledgement -- References -- IV INFRASTRUCTURE DEVICE SECURITY -- Chapter 9 LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING -- 1. Introduction -- 2. Background and Related Work -- 2.1 Confidential Computing -- 2.2 RISC-V Instruction Set Architecture -- 2.3 Keystone Enclave -- 2.4 Related Work -- 3. Experimental Configuration -- 4. Proposed Development -- 5. Experimental Results and Analysis -- 6. Conclusions -- References -- Chapter 10 EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE -- 1. Introduction -- 2. Background -- 2.1 Talos II Architecture -- 2.2 PNOR Image Structure.
2.3 Initial Program Load -- 2.4 Ciphers -- 2.5 Secure Key Management -- 3. Related Work -- 3.1 Secure Firmware Updates Using AES -- 3.2 Image Encryption -- 4. Experimental Setup -- 4.1 Microcontroller Setup -- 5. Experimental Methodology -- 5.1 Experimental Factors -- 5.2 Data Collection -- 5.3 Application Scenarios -- 5.4 Assumptions -- 6. Experimental Results and Analysis -- 6.1 Boot Image Encryption Performance Impact -- 6.2 Comparison of Encryption Methods -- 6.3 Encryption Ratio -- 7. Conclusions -- References -- V TELECOMMUNICATIONS SYSTEMS SECURITY -- Chapter 11 SECURING INFINIBAND TRAFFIC WITH BLUEFIELD-2 DATA PROCESSING UNITS -- 1. Introduction -- 2. Background and Related Work -- 2.1 InfiniBand Network Overview -- 2.2 Convergent Technologies -- 2.3 Security Concepts -- 3. Testbed Design -- 4. Experimental Scenarios -- 5. Experimental Results -- 6. Conclusions -- References.
Record Nr. UNINA-9910633936603321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (X, 253 p. 84 illus., 7 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-49585-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks.
Record Nr. UNINA-9910799493803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Legal Aspects of Computing
Computers and Society
ISBN 3-030-20951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466330703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Computer networks - Security measures
Data encryption (Computer science)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Computer Communication Networks
Mobile and Network Security
Cryptology
Legal Aspects of Computing
Computers and Society
ISBN 3-030-20951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910337850903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity in France / / by Philippe Baumard
Cybersecurity in France / / by Philippe Baumard
Autore Baumard Philippe
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (IX, 106 p. 12 illus.)
Disciplina 343.0999
Collana SpringerBriefs in Cybersecurity
Soggetto topico Computers
Law and legislation
Legal Aspects of Computing
ISBN 3-319-54308-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- A Brief History of Hacking and Cyberdefense -- The Determinants of a National Cyber-strategy -- National Cyberdoctrines: Forthcoming Strategic Shifts -- Conclusion.
Record Nr. UNINA-9910254822003321
Baumard Philippe  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui