Muutke küpsiste eelistusi

E-raamat: Cyber Security Applications for Industry 4.0

Edited by (Vellore Institute of Technology (VIT) Vellore, India), Edited by (Taylors University, Malaysia), Edited by (Amrita vishwa vidyapeetham)
  • Formaat - PDF+DRM
  • Hind: 71,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering. It is primarily aimed at industry professionals, academicians and researchers for better understanding of the secure data transition between the Industry 4.0 enabled connected systems.



Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging.

Features:

  • Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect
  • Creates new business models for Industrialists on Control Systems and provides productive workforce transformation
  • Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0
  • Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives

The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

1. A Detailed Investigation of Popular Attacks on Cyber Physical
Systems.
2. Applying Agile Practices in the Development of Industry 4.0
Applications.
3. A Review of Security Vulnerabilities in Industry 4.0
Application and the Possible Solutions Using Blockchain.
4. The Role of
Cutting-Edge Technologies in Industry 4.0.
5. Secure IoT Protocol for
Implementing Classified Electroencephalogram (EEG) Signals in the Field of
Smart Healthcare.
6. Cybersecurity for Critical Energy Protection in Smart
Cities.
7. Emerging Industry Revolution IR 4.0 Issues and Challenges.
8.
IIoT-Based Secure Smart Manufacturing Systems in SMEs.
9. The Role of Cyber
Security in Smart Cities.
10. A Theoretical Framework on Enhancing Cloud
Storage Security through Customized ECC Key Management Technique.