Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Material
Language
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer International Publishing AG
    ISBN: 9783319923154 , 3319923153
    Language: English
    Pages: 1 Online-Ressource (XIV, 186 Seiten)
    Edition: 1st ed. 2019
    Series Statement: Palgrave Studies in Globalization and Embodiment
    Parallel Title: Erscheint auch als Navarro-Ayala, Luis Queering Transcultural Encounters
    DDC: 306.4613
    Keywords: Human body—Social aspects ; Culture ; Queer theory ; Latin American literature ; African literature ; Literature, Modern—20th century ; Sociology of the Body ; Sociology of Culture ; Queer Studies ; Latin American/Caribbean Literature ; African Literature ; Twentieth-Century Literature
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Article
    Article
    Show associated volumes/articles
    In:  Poverty in transition economies (2000), Seite 208-227 | year:2000 | pages:208-227
    ISBN: 0415215501
    Language: English
    Titel der Quelle: Poverty in transition economies
    Publ. der Quelle: London [u.a.] : Routledge, 2000
    Angaben zur Quelle: (2000), Seite 208-227
    Angaben zur Quelle: year:2000
    Angaben zur Quelle: pages:208-227
    Keywords: 1975-1995 ; Armut ; Sozialpolitik ; Öffentliche Sozialleistungen ; Politische Reform ; Spanien ; Aufsatz im Buch
    Note: In: Poverty in transition economies
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Article
    Article
    In:  Handbook of research methods in migration 2012, S. 117-136
    Language: English
    Titel der Quelle: Handbook of research methods in migration
    Angaben zur Quelle: 2012, S. 117-136
    Note: Luis Sánchez-Ayala
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781484221556 , 1484221559
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Internet ; Security measures ; Health facilities ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim. What You'll Learn Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack Identify possible ways hackers can hack hospital and healthcare facility equipment Recognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome Detect and prevent man-in-the-middle or denial-of-service cyber-attacks Find and prevent hacking of the hospital database and hospital web application Who This Book Is For Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals
    Note: Place of publication from publisher's website (viewed January 31, 2017). - Includes index. - Description based on online resource; title from cover (viewed January 31, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [New York, New York] : Apress
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Computer networks ; Security measures ; Dictionaries ; Computer security ; Dictionaries ; Buildings ; Security measures ; Dictionaries ; Electronic books ; Electronic books ; local
    Abstract: This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked. The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world. Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides: Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase. Definitions of technical terms related to equipment controls common to industry, utilities, and buildings-much of the terminology also applies to cybersecurity in general.
    Note: Place of publication from publisher's website. - Description based on online resource; title from title page (Safari, viewed July 27, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Cooperating objects (Computer systems) ; Security measures ; Computer security ; Computer crimes ; Investigation ; Electronic books ; Electronic books ; local
    Abstract: This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know-it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you'll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.
    Note: Place of publication from publisher's website. - Description based on online resource; title from cover (Safari, viewed July 15, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Imprint: Palgrave Macmillan
    ISBN: 9783319923154
    Language: English
    Pages: 1 Online-Ressource (XIV, 186 p)
    Series Statement: Palgrave Studies in Globalization and Embodiment
    Parallel Title: Printed edition
    Parallel Title: Printed edition
    DDC: 306.4613
    Keywords: Human body-Social aspects ; Queer theory ; Latin American literature ; African literature ; Literature, Modern-20th century
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9788477958024
    Language: Catalan
    Pages: 191 Seiten
    Keywords: Bildband ; Ausstellungskatalog ; Bildband ; Ausstellungskatalog
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Article
    Article
    Show associated volumes/articles
    In:  América indígena : órgano trimestral del Instituto Indigenista Interamericano Vol. 57, No. 1-2 (1997), p. 371
    ISSN: 0185-1179
    Language: Undetermined
    Titel der Quelle: América indígena : órgano trimestral del Instituto Indigenista Interamericano
    Publ. der Quelle: México : Inst
    Angaben zur Quelle: Vol. 57, No. 1-2 (1997), p. 371
    DDC: 390
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Article
    Article
    Show associated volumes/articles
    In:  Handbook of research methods in migration (2012), Seite 117-136 | year:2012 | pages:117-136
    ISBN: 1781005427
    Language: Undetermined
    Titel der Quelle: Handbook of research methods in migration
    Publ. der Quelle: Cheltenham [u.a.] : Elgar, 2012
    Angaben zur Quelle: (2012), Seite 117-136
    Angaben zur Quelle: year:2012
    Angaben zur Quelle: pages:117-136
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...