000 | 02929nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-642-41485-5 | ||
003 | DE-He213 | ||
005 | 20240423130048.0 | ||
007 | cr nn 008mamaa | ||
008 | 131018s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642414855 _9978-3-642-41485-5 |
||
024 | 7 |
_a10.1007/978-3-642-41485-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCritical Information Infrastructures Security _h[electronic resource] : _b7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers / _cedited by Bernhard Hämmerli, Nils Kalstad Svendsen, Javier Lopez. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXIV, 277 p. 103 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7722 |
|
505 | 0 | _aIntrusion management -- Smart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling. | |
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aHämmerli, Bernhard. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKalstad Svendsen, Nils. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLopez, Javier. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642414848 |
776 | 0 | 8 |
_iPrinted edition: _z9783642414862 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7722 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-41485-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c184630 _d184630 |