//]]>

Securing Electricity Supply in the Cyber Age (Record no. 12454)

000 -LEADER
fixed length control field 03761nam a22005175i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310143357.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2010 ne | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789048135943
978-90-481-3594-3
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.042
Edition number 23
264 #1 -
-- Dordrecht :
-- Springer Netherlands,
-- 2010.
912 ## -
-- ZDB-2-ENG
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lukszo, Zofia.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Securing Electricity Supply in the Cyber Age
Medium [electronic resource] :
Remainder of title Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure /
Statement of responsibility, etc edited by Zofia Lukszo, Geert Deconinck, Margot P. C. Weijnen.
300 ## - PHYSICAL DESCRIPTION
Extent VI, 187p.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Topics in Safety, Risk, Reliability and Quality,
International Standard Serial Number 1566-0443 ;
Volume number/sequential designation 15
520 ## - SUMMARY, ETC.
Summary, etc The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. These problems were addressed at an advanced research workshop, titled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT", which was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. This book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element System safety.
Topical term or geographic name as entry element Telecommunication.
Topical term or geographic name as entry element Systems engineering.
Topical term or geographic name as entry element Electric engineering.
Topical term or geographic name as entry element Economic policy.
Topical term or geographic name as entry element Technology.
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Energy Technology.
Topical term or geographic name as entry element Communications Engineering, Networks.
Topical term or geographic name as entry element Quality Control, Reliability, Safety and Risk.
Topical term or geographic name as entry element Circuits and Systems.
Topical term or geographic name as entry element Technology Management.
Topical term or geographic name as entry element Economic Policy.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Deconinck, Geert.
Relator term editor.
Personal name Weijnen, Margot P. C.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789048135936
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-90-481-3594-3
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-03AUM Main Library2014-04-03 2014-04-03 E-Book   AUM Main Library621.042

Languages: 
English |
العربية