Cyber-physical attacks : (Record no. 613462)

MARC details
000 -LEADER
fixed length control field 07071cam a2200829Ii 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250919085810.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161221s2015 enk ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128014639
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128014636
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128012901
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 433954108
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 16092611
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 341782726
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 010547901
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 451526449
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 453330789
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV042991555
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier ZWZ
System control number 191312193
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043620608
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)910102749
Canceled/invalid control number (OCoLC)910446918
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn910102749
037 ## - SOURCE OF ACQUISITION
Stock number 6409BF55-342E-4BE0-80AC-B4D97FBA2E67
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
y 12-21-2016
z hafiz
w metacoll.MYUKM.updates.D20160920.T210208.sdallbooks.1 (perolehan)hafizupload21122016.mrc
x 158
040 ## - CATALOGING SOURCE
Original cataloging agency NST
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency NST
Modifying agency NST
-- IDEBK
-- OPELS
-- YDXCP
-- TEFOD
-- E7B
-- EBLCP
-- NLGGC
-- DEBSZ
-- CDX
-- TEFOD
-- OCLCF
-- VLB
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number L68 2015eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition information 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Loukas, George,
Relator term author.
245 10 - TITLE STATEMENT
Title Cyber-physical attacks :
Remainder of title a growing invisible threat /
Statement of responsibility, etc. George Loukas.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Oxford :
Name of producer, publisher, distributor, manufacturer Butterworth-Heinemann is an imprint of Elsevier,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege
520 ## - SUMMARY, ETC.
Summary, etc. Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (Ebsco, viewed May 27, 2015).
590 ## - LOCAL NOTE (RLIN)
Local note Elsevier
Provenance (VM) [OBSOLETE] ScienceDirect All Books
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded computer systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded Internet devices.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Internet Security
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / Security
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01893401
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded computer systems.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00908298
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded Internet devices.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01742162
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01894151
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01160283
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Loukas, George
Title Cyber-Physical Attacks : A Growing Invisible Threat
Place, publisher, and date of publication Burlington : Elsevier Science,c2015
International Standard Book Number 9780128012901
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901">https://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901</a>
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b16400768
b 2022-11-01
c 2019-11-12
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC No
914 ## - VTLS Number
VTLS Number vtls003614181
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Library
Operator's initials, OID (RLIN) 2016-08-12
Cataloger's initials, CIN (RLIN) m
Material Type (Sierra) E-Book
Language English
Country
-- 0
-- .b16400768

No items available.


Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library