Critical Infrastructure Protection in the Light of the Armed Conflicts (Registro nro. 274480)

MARC details
000 -LIDER
fixed length control field 05524nam a22006015i 4500
001 - CONTROL NUMBER
control field 978-3-031-47990-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250516160009.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240315s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031479908
-- 978-3-031-47990-8
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TH9701-9745
072 #7 - SUBJECT CATEGORY CODE
Subject category code TNKS
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code SCI055000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TNKS
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621
Edition number 23
245 10 - TITLE STATEMENT
Title Critical Infrastructure Protection in the Light of the Armed Conflicts
Medium [electronic resource] /
Statement of responsibility, etc. edited by Tünde Anna Kovács, Zoltán Nyikes, Tamás Berek, Norbert Daruka, László Tóth.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 534 p. 125 illus., 107 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Advanced Sciences and Technologies for Security Applications,
International Standard Serial Number 2363-9466
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Intelligence and protection of key (critical) infrastructure objects -- 2. Examination of UV radiation during inert gas arc welding -- 3. Current legal challenges related to social networking sites -- 4. Cyber Threats to Consumers and Other Risks in the Field of E-commerce Security -- 5. Space Weather Effects on Critical Infrastructure -- 6. Exploring the Nexus Between Critical Infrastructure, Fragility and Peace Operations -- 7. Terrorist threats to African hospitals -- 8. Surface Modification of Metallic Materials using Laser and Plasma Technologies -- 9. Threats and Vulnerabilities in Web Applications and How to Avoid them -- 10. Managing climate change risks in critical infrastructure protection with examples from the European financial sector -- 11. Bionic Hand with Phalanx built-in servos -- 12. Review of the Maintenance Strategies, and Failures in the Aspects of the Reliability.
520 ## - SUMMARY, ETC.
Summary, etc. This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to Europe than at any time in the last several decades, and the protection of critical infrastructures has gained new prominence. This situation has also revealed the vulnerability of critical infrastructure and the importance of its protection. The development of technologies, cybertechnologies, and digitalization in all aspects of our daily lives implies new security challenges in critical infrastructure protection and security science and this book addresses the four main dimensions of critical infrastructure protection: 1. Physical protection 2. Cybersecurity 3. Political security 4. Individual security The issue of physical security has accompanied humanity since its birth. Nowadays, this issue has become even more important due to technological advances, as this is the security area that people physically experience-physical protection, including protection against explosions and ballistic attacks, but also defense of objects and guaranteeing transportation security. Cyberspace represents the fifth domain of warfare and a central security question in our age. The base of cyberspace defense is high-quality hardware and expert support. With our lives increasingly digital, cybersecurity's core elements include safety awareness and informatics. Political security, the third dimension, is shaped by diverse political ideologies influencing economies, societies, and other aspects of life. This book explores topics such as migration policies, defense against terrorism, national and international security, and public safety. The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Security systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data protection.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Security Science and Technology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data and Information Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kovács, Tünde Anna.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nyikes, Zoltán.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Berek, Tamás.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daruka, Norbert.
Relator term editor.
-- (orcid)0000-0002-7102-1787
-- https://orcid.org/0000-0002-7102-1787
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tóth, László.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031479892
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031479915
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031479922
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advanced Sciences and Technologies for Security Applications,
-- 2363-9466
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-47990-8
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 16/05/2025   16/05/2025 1 Libro Electrónico

Con tecnología Koha