Islamic University of Technology OPAC

Cyber-physical attacks : (Record no. 7685)

MARC details
000 -LEADER
fixed length control field 03336cam a22004937i 4500
003 - CONTROL NUMBER IDENTIFIER
control field BD-GzIUT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230919103442.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150406t20152015enka b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2015937982
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128012901
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128012900
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128014639
Qualifying information (PDF ebook)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn915331262
040 ## - CATALOGING SOURCE
Original cataloging agency CDX
Language of cataloging eng
Transcribing agency CDX
Description conventions rda
Modifying agency YDXCP
-- BTCTA
-- YOU
-- NHA
-- OCLCF
-- BDX
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number L679 2015
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.1/68
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Loukas, George,
Relator term author.
245 10 - TITLE STATEMENT
Title Cyber-physical attacks :
Remainder of title a growing invisible threat /
Statement of responsibility, etc. George Loukas.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Oxford, UK :
Name of producer, publisher, distributor, manufacturer Waltham, MA, USA :
-- Elsevier/BH, Butterworth-Heinemann is an imprint of Elsevier,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015
300 ## - PHYSICAL DESCRIPTION
Extent viii, 262 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.<br/><br/>The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.<br/><br/>Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.
Expansion of summary note Demonstrates how to identify and protect against cyber-physical threats<br/>Written for undergraduate students and non-experts, especially physical security professionals without computer science background<br/>Suitable for training police and security professionals<br/>Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectors<br/>Includes online resources for those teaching security management
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded computer systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded Internet devices.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01893401
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded computer systems.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00908298
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Embedded Internet devices.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01742162
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01894151
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ubiquitous computing.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01160283
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.sciencedirect.com/science/book/9780128012901">http://www.sciencedirect.com/science/book/9780128012901</a>
Link text Full Text Available to Download
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Date last seen Uniform Resource Identifier Price effective from Koha item type
    Dewey Decimal Classification     IUT Library IUT Library Virtual (E-Books) 09/19/2023 Elsevier   09/19/2023 http://www.sciencedirect.com/science/book/9780128012901 09/19/2023 E-Books

© 2024 | Library, Islamic University of Technology