Linked e-resources
Details
Table of Contents
Chapter 1. The Safety and Security Landscape
Chapter 2.Safety and Security Design Processes
Chapter 3.Threats and Threat Analysis
Chapter 4.Architectures
Chapter 5. Security Testing and Runtime Monitoring
Chapter 6. False Data Injection Attacks.
Chapter 2.Safety and Security Design Processes
Chapter 3.Threats and Threat Analysis
Chapter 4.Architectures
Chapter 5. Security Testing and Runtime Monitoring
Chapter 6. False Data Injection Attacks.