TY - BOOK ID - 8286165 TI - Cyber security : deterrence and IT protection for critical infrastructures PY - 2013 SN - 3319022784 3319022792 PB - New York : Springer, DB - UniCat KW - Computer networks -- Security measures. KW - Deterrence (Strategy). KW - Penetration testing (Computer security). KW - Social Welfare & Social Work KW - Engineering & Applied Sciences KW - Social Sciences KW - Criminology, Penology & Juvenile Delinquency KW - Computer Science KW - Cyberspace KW - Computer crimes. KW - Security measures. KW - Computer security. KW - Computers and crime KW - Cyber crimes KW - Cybercrimes KW - Electronic crimes (Computer crimes) KW - Internet crimes KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Security of computer systems KW - Security measures KW - Protection of computer systems KW - Protection KW - Computer science. KW - Computer communication systems. KW - Data structures (Computer science). KW - Data encryption (Computer science). KW - Computer Science. KW - Systems and Data Security. KW - Information Systems Applications (incl. Internet). KW - Data Encryption. KW - Data Structures, Cryptology and Information Theory. KW - Computer Communication Networks. KW - Data protection KW - Security systems KW - Hacking KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - Electronic data processing KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Network computers KW - Informatics KW - Science KW - Distributed processing KW - Crime KW - Privacy, Right of KW - Space and time KW - Telematics KW - Data structures (Computer scienc. KW - Cryptology. KW - Data Structures and Information Theory. KW - Data structures (Computer science) KW - Application software. KW - Application computer programs KW - Application computer software KW - Applications software KW - Apps (Computer software) KW - Computer software KW - Computer networks KW - Internet KW - Data encryption (Computer science) KW - Deterrence (Strategy) KW - Penetration testing (Computer security) UR - https://www.unicat.be/uniCat?func=search&query=sysid:8286165 AB - The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resilience and security of Industrial Control Systems. The combination of contextual overview and future directions in the field makes this brief a useful resource for researchers and professionals studying systems security, data security and data structures. Advanced-level students interested in data security will also find this brief a helpful guide to recent research. ER -