Jaaj.sk je nový FREE porovnávač produktov a cien. Budujeme AI alternatívu ku klasickým porovnávačom

Spúšťame databázu
Produkty • kategórie • porovnania

Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru Soldatos John

Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru Soldatos John Modern critical infrastructures…

od 134 €

Specifikacia Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru Soldatos John


Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru Soldatos John

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective.

cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. This book presents integrated (i.e. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures.

Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastru Soldatos John patrí medzi produkty, ktoré ponúkajú vyvážený pomer kvality a ceny. V hornej časti stránky nájdeš hlavný prehľad, nižšie podrobné vlastnosti a technické parametre.

Likewise, it presets how established security technologies like

Top