Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
| Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson |
| Autore | Ward David D (Electronics engineer) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2021 |
| Descrizione fisica | 1 online resource (1 PDF (xii, 93 pages)) : color illustrations |
| Disciplina | 629.2826 |
| Soggetto topico |
Automotive computers - Security measures
Computer security - Standards COMPUTERS / Security / General TECHNOLOGY & ENGINEERING / Automotive TRANSPORTATION / Automotive / General Computer security Automotive technology and trades Road and motor vehicles: general interest |
| ISBN |
1-4686-0083-4
1-4686-0081-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index. |
| Record Nr. | UNINA-9910795798803321 |
Ward David D (Electronics engineer)
|
||
| Warrendale, Pennsylvania : , : SAE International, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson
| Automotive cybersecurity : an introduction to ISO/SAE 21434 / / by Dr. David Ward and Paul Wooderson |
| Autore | Ward David D (Electronics engineer) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Warrendale, Pennsylvania : , : SAE International, , 2021 |
| Descrizione fisica | 1 online resource (1 PDF (xii, 93 pages)) : color illustrations |
| Disciplina | 629.2826 |
| Soggetto topico |
Automotive computers - Security measures
Computer security - Standards COMPUTERS / Security / General TECHNOLOGY & ENGINEERING / Automotive TRANSPORTATION / Automotive / General Computer security Automotive technology and trades Road and motor vehicles: general interest |
| ISBN |
1-4686-0083-4
1-4686-0081-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface -- About the authors -- Chapter 1: Introduction to automotive cybersecurity -- Chapter 2: Cybersecurity for automotive cyber-physical systems -- Chapter 3: Establishing a cybersecurity process -- Chapter 4: Assurance and certification -- Chaper 5: Conclusions and going further -- References -- Index. |
| Record Nr. | UNINA-9910826019903321 |
Ward David D (Electronics engineer)
|
||
| Warrendale, Pennsylvania : , : SAE International, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia
| Digital Earth : Cyber Threats, Privacy and Ethics in an Age of Paranoia |
| Autore | Katz Sarah |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Ely : , : IT Governance Ltd, , 2022 |
| Descrizione fisica | 1 online resource (108 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
LAW / Computer & Internet
COMPUTERS / Security / General LAW / Communications LAW / Criminal Law / General |
| Soggetto non controllato | Mathematics |
| ISBN |
9781787783607
178778360X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading. |
| Record Nr. | UNINA-9911009185503321 |
Katz Sarah
|
||
| Ely : , : IT Governance Ltd, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||