MARC details
000 -LEADER |
fixed length control field |
03336cam a22004937i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BD-GzIUT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230919103442.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150406t20152015enka b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015937982 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128012901 |
Qualifying information |
(pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0128012900 |
Qualifying information |
(pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9780128014639 |
Qualifying information |
(PDF ebook) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn915331262 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CDX |
Language of cataloging |
eng |
Transcribing agency |
CDX |
Description conventions |
rda |
Modifying agency |
YDXCP |
-- |
BTCTA |
-- |
YOU |
-- |
NHA |
-- |
OCLCF |
-- |
BDX |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
L679 2015 |
050 14 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV6773 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.1/68 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Loukas, George, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cyber-physical attacks : |
Remainder of title |
a growing invisible threat / |
Statement of responsibility, etc. |
George Loukas. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Oxford, UK : |
Name of producer, publisher, distributor, manufacturer |
Waltham, MA, USA : |
-- |
Elsevier/BH, Butterworth-Heinemann is an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2015] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 262 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.<br/><br/>The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.<br/><br/>Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future. |
Expansion of summary note |
Demonstrates how to identify and protect against cyber-physical threats<br/>Written for undergraduate students and non-experts, especially physical security professionals without computer science background<br/>Suitable for training police and security professionals<br/>Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectors<br/>Includes online resources for those teaching security management |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyber intelligence (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ubiquitous computing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Embedded computer systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Embedded Internet devices. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet of things. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyber intelligence (Computer security) |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01893401 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Embedded computer systems. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00908298 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Embedded Internet devices. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01742162 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet of things. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01894151 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ubiquitous computing. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst01160283 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://www.sciencedirect.com/science/book/9780128012901">http://www.sciencedirect.com/science/book/9780128012901</a> |
Link text |
Full Text Available to Download |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
E-Books |
Suppress in OPAC |
No |