{"id":13744,"date":"2017-02-09T13:00:25","date_gmt":"2017-02-09T16:00:25","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=13744"},"modified":"2017-02-09T03:02:11","modified_gmt":"2017-02-09T06:02:11","slug":"cyber-physical-attacks-a-growing-invisible-threat","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/cyber-physical-attacks-a-growing-invisible-threat\/","title":{"rendered":"Cyber-Physical Attacks: A Growing Invisible Threat"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-13745\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/02\/Cyber-Physical-Attacks-A-Growing-Invisible-Threat.jpg\" alt=\"Cyber-Physical Attacks: A Growing Invisible Threat\" width=\"145\" height=\"179\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/02\/Cyber-Physical-Attacks-A-Growing-Invisible-Threat.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/02\/Cyber-Physical-Attacks-A-Growing-Invisible-Threat-122x150.jpg 122w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>George Loukas PhD<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition Butterworth-Heinemann<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building\u2019s lights, make a car veer off the road,\u00a0 or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.<\/p>\n<p>The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.<\/p>\n<p>Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.<\/p>\n<p>&#8211; Demonstrates how to identify and protect against cyber-physical threats;<br \/>\n&#8211; Written for undergraduate students and non-experts, especially physical security professionals without computer science background;<br \/>\n&#8211; Suitable for training police and security professionals;<br \/>\n&#8211; Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectors;<br \/>\n&#8211; Includes online resources for those teaching security management.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>George Loukas PhD Maison d&#8217;\u00e9dition Butterworth-Heinemann R\u00e9sum\u00e9: Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building\u2019s lights, make a car veer off the road,\u00a0 or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using&hellip; <\/p>\n","protected":false},"author":3,"featured_media":13745,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20],"tags":[],"class_list":["post-13744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao"],"views":260,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=13744"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13744\/revisions"}],"predecessor-version":[{"id":13746,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13744\/revisions\/13746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/13745"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=13744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=13744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=13744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}