Cyber-physical attacks : (Record no. 613462)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 07071cam a2200829Ii 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250919085810.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr cnu|||unuuu |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 161221s2015 enk ob 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780128014639 |
| Qualifying information | electronic bk. |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0128014636 |
| Qualifying information | electronic bk. |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9780128012901 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | DEBSZ |
| System control number | 433954108 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | NZ1 |
| System control number | 16092611 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | CHVBK |
| System control number | 341782726 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | CHBIS |
| System control number | 010547901 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | DEBSZ |
| System control number | 451526449 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | DEBSZ |
| System control number | 453330789 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | DEBBG |
| System control number | BV042991555 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | ZWZ |
| System control number | 191312193 |
| 029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
| OCLC library identifier | DEBBG |
| System control number | BV043620608 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)910102749 |
| Canceled/invalid control number | (OCoLC)910446918 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)ocn910102749 |
| 037 ## - SOURCE OF ACQUISITION | |
| Stock number | 6409BF55-342E-4BE0-80AC-B4D97FBA2E67 |
| Source of stock number/acquisition | OverDrive, Inc. |
| Note | http://www.overdrive.com |
| 039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] | |
| y | 12-21-2016 |
| z | hafiz |
| w | metacoll.MYUKM.updates.D20160920.T210208.sdallbooks.1 (perolehan)hafizupload21122016.mrc |
| x | 158 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | NST |
| Language of cataloging | eng |
| Description conventions | rda |
| -- | pn |
| Transcribing agency | NST |
| Modifying agency | NST |
| -- | IDEBK |
| -- | OPELS |
| -- | YDXCP |
| -- | TEFOD |
| -- | E7B |
| -- | EBLCP |
| -- | NLGGC |
| -- | DEBSZ |
| -- | CDX |
| -- | TEFOD |
| -- | OCLCF |
| -- | VLB |
| 049 ## - LOCAL HOLDINGS (OCLC) | |
| Holding library | MAIN |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | L68 2015eb |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | COM |
| Subject category code subdivision | 060040 |
| Source | bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | COM |
| Subject category code subdivision | 043050 |
| Source | bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | COM |
| Subject category code subdivision | 053000 |
| Source | bisacsh |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition information | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Loukas, George, |
| Relator term | author. |
| 245 10 - TITLE STATEMENT | |
| Title | Cyber-physical attacks : |
| Remainder of title | a growing invisible threat / |
| Statement of responsibility, etc. | George Loukas. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | Oxford : |
| Name of producer, publisher, distributor, manufacturer | Butterworth-Heinemann is an imprint of Elsevier, |
| Date of production, publication, distribution, manufacture, or copyright notice | [2015] |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource |
| 336 ## - CONTENT TYPE | |
| Content type term | text |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type term | computer |
| Media type code | c |
| Source | rdamedia |
| 338 ## - CARRIER TYPE | |
| Carrier type term | online resource |
| Carrier type code | cr |
| Source | rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future. |
| 588 0# - SOURCE OF DESCRIPTION NOTE | |
| Source of description note | Online resource; title from PDF title page (Ebsco, viewed May 27, 2015). |
| 590 ## - LOCAL NOTE (RLIN) | |
| Local note | Elsevier |
| Provenance (VM) [OBSOLETE] | ScienceDirect All Books |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cyber intelligence (Computer security) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Ubiquitous computing. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Embedded computer systems. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Embedded Internet devices. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Internet of things. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | COMPUTERS / Internet Security |
| Source of heading or term | bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | COMPUTERS / Networking / Security |
| Source of heading or term | bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | COMPUTERS / Security / General |
| Source of heading or term | bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cyber intelligence (Computer security) |
| Source of heading or term | fast |
| Authority record control number or standard number | (OCoLC)fst01893401 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Embedded computer systems. |
| Source of heading or term | fast |
| Authority record control number or standard number | (OCoLC)fst00908298 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Embedded Internet devices. |
| Source of heading or term | fast |
| Authority record control number or standard number | (OCoLC)fst01742162 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Internet of things. |
| Source of heading or term | fast |
| Authority record control number or standard number | (OCoLC)fst01894151 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Ubiquitous computing. |
| Source of heading or term | fast |
| Authority record control number or standard number | (OCoLC)fst01160283 |
| 655 #4 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Electronic books. |
| 655 #0 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Electronic books. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Relationship information | Print version: |
| Main entry heading | Loukas, George |
| Title | Cyber-Physical Attacks : A Growing Invisible Threat |
| Place, publisher, and date of publication | Burlington : Elsevier Science,c2015 |
| International Standard Book Number | 9780128012901 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901">https://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901</a> |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) | |
| a | .b16400768 |
| b | 2022-11-01 |
| c | 2019-11-12 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Suppress in OPAC | No |
| 914 ## - VTLS Number | |
| VTLS Number | vtls003614181 |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) | |
| Library | |
| Operator's initials, OID (RLIN) | 2016-08-12 |
| Cataloger's initials, CIN (RLIN) | m |
| Material Type (Sierra) | E-Book |
| Language | English |
| Country | |
| -- | 0 |
| -- | .b16400768 |
No items available.
