000 05524nam a22006015i 4500
001 978-3-031-47990-8
003 DE-He213
005 20250516160009.0
007 cr nn 008mamaa
008 240315s2024 sz | s |||| 0|eng d
020 _a9783031479908
_9978-3-031-47990-8
050 4 _aTH9701-9745
072 7 _aTNKS
_2bicssc
072 7 _aSCI055000
_2bisacsh
072 7 _aTNKS
_2thema
082 0 4 _a621
_223
245 1 0 _aCritical Infrastructure Protection in the Light of the Armed Conflicts
_h[electronic resource] /
_cedited by Tünde Anna Kovács, Zoltán Nyikes, Tamás Berek, Norbert Daruka, László Tóth.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXV, 534 p. 125 illus., 107 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Intelligence and protection of key (critical) infrastructure objects -- 2. Examination of UV radiation during inert gas arc welding -- 3. Current legal challenges related to social networking sites -- 4. Cyber Threats to Consumers and Other Risks in the Field of E-commerce Security -- 5. Space Weather Effects on Critical Infrastructure -- 6. Exploring the Nexus Between Critical Infrastructure, Fragility and Peace Operations -- 7. Terrorist threats to African hospitals -- 8. Surface Modification of Metallic Materials using Laser and Plasma Technologies -- 9. Threats and Vulnerabilities in Web Applications and How to Avoid them -- 10. Managing climate change risks in critical infrastructure protection with examples from the European financial sector -- 11. Bionic Hand with Phalanx built-in servos -- 12. Review of the Maintenance Strategies, and Failures in the Aspects of the Reliability.
520 _aThis book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to Europe than at any time in the last several decades, and the protection of critical infrastructures has gained new prominence. This situation has also revealed the vulnerability of critical infrastructure and the importance of its protection. The development of technologies, cybertechnologies, and digitalization in all aspects of our daily lives implies new security challenges in critical infrastructure protection and security science and this book addresses the four main dimensions of critical infrastructure protection: 1. Physical protection 2. Cybersecurity 3. Political security 4. Individual security The issue of physical security has accompanied humanity since its birth. Nowadays, this issue has become even more important due to technological advances, as this is the security area that people physically experience-physical protection, including protection against explosions and ballistic attacks, but also defense of objects and guaranteeing transportation security. Cyberspace represents the fifth domain of warfare and a central security question in our age. The base of cyberspace defense is high-quality hardware and expert support. With our lives increasingly digital, cybersecurity's core elements include safety awareness and informatics. Political security, the third dimension, is shaped by diverse political ideologies influencing economies, societies, and other aspects of life. This book explores topics such as migration policies, defense against terrorism, national and international security, and public safety. The fourth dimension, individual security, spans healthcare, food safety, energy supplies, and economic security. Each chapter of this book emphasizes security, focusing on Central Europe while addressing global concerns. Authored by researchers, experts, and scholars, this book is invaluable for Ph.D. students, professionals, and educators worldwide.
541 _fUABC ;
_cPerpetuidad
650 0 _aSecurity systems.
650 0 _aCooperating objects (Computer systems).
650 0 _aData protection.
650 1 4 _aSecurity Science and Technology.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aData and Information Security.
700 1 _aKovács, Tünde Anna.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNyikes, Zoltán.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBerek, Tamás.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDaruka, Norbert.
_eeditor.
_0(orcid)0000-0002-7102-1787
_1https://orcid.org/0000-0002-7102-1787
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTóth, László.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031479892
776 0 8 _iPrinted edition:
_z9783031479915
776 0 8 _iPrinted edition:
_z9783031479922
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-47990-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c274480
_d274479