Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems

Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 eBook
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 62,52 €

Jetzt 60,97 €* eBook

Artikel-Nr:
9783030258085
Veröffentl:
2019
Einband:
eBook
Seiten:
91
Autor:
Marilyn Wolf
eBook Typ:
PDF
eBook Format:
Reflowable eBook
Kopierschutz:
Digital Watermark [Social-DRM]
Sprache:
Englisch
Beschreibung:

?This book provides the first comprehensive view of safe and secure CPS and IoT systems.  The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people.    Offers readers a unified view of safety and security, from basic concepts through research challenges;Provides a detailed comparison of safety and security methodologies;Describes a comprehensive threat model including attacks, design errors, and faults;Identifies important commonalities and differences in safety and security engineering.

​This book provides the first comprehensive view of safe and secure CPS and IoT systems.  The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different people.    


  • Offers readers a unified view of safety and security, from basic concepts through research challenges;
  • Provides a detailed comparison of safety and security methodologies;
  • Describes a comprehensive threat model including attacks, design errors, and faults;
  • Identifies important commonalities and differences in safety and security engineering.

Chapter 1. The Safety and Security Landscape.- Chapter 2.Safety and Security Design Processes.- Chapter 3.Threats and Threat Analysis.- Chapter 4.Architectures.- Chapter 5. Security Testing and Runtime Monitoring.- Chapter 6. False Data Injection Attacks.


Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.