000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180413b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319328249 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
CLA |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Clark, Robert M |
245 ## - TITLE STATEMENT |
Title |
Cyber-physical security |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2017 |
Place of publication, distribution, etc |
Switzerland: |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 281 p. |
Other physical details |
col. ill. |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
EURO |
Price amount |
119.99/ Rs. 10055.16 |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Political Science |
|
Topical term or geographic name as entry element |
International Relations |
|
Topical term or geographic name as entry element |
Aquatic Pollution |
|
Topical term or geographic name as entry element |
Cyberinfrastructure - Security measures |
|
Topical term or geographic name as entry element |
Cyber risk |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hakim, Simon |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |