Cybersecurity in the transportation industry (Record no. 1680)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02441nam a2200229 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250716141952.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250716b2024|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394204465 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 363.287 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Shah, Imdad Ali |
| Relator term | Editor |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Jhanjhi, Noor Zaman |
| Relator term | Co-Editor |
| 245 ## - TITLE STATEMENT | |
| Title | Cybersecurity in the transportation industry |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2024. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xi, 251p. |
| 500 ## - GENERAL NOTE | |
| General note | This book offers crucial solutions and insights on how transportation companies can enhance their cybersecurity management and protect their corporate reputation and revenue from the increasing risk of cyberattacks.<br/><br/>The movement of people and goods from one location to another has always been essential to human development and survival. People are now exploring new methods of carrying goods. Transportation infrastructure is critical to the growth of a global community that is more united and connected. The presented cybersecurity framework is an example of a risk-based method for managing cybersecurity risk. An organisation can find opportunities to strengthen and explain its management of cybersecurity risk by using its existing procedures and leveraging the framework. The framework can provide a foundation for businesses that do not currently have a formal cybersecurity program.<br/><br/>However, there is a strong temptation to give in when a transportation company is facing a loss of millions of dollars and the disruption of the worldwide supply chain. Automobile production, sales, trucking, and shipping are high-value industries for transportation enterprises. Scammers know that these corporations stand to lose much more in terms of corporate revenue and reputation than even the highest ransom demands, making them appealing targets for their schemes.<br/><br/>This book will address the increasing risk of cyberattacks and offer solutions and insight on the safety and security of passengers, cargo, and transportation infrastructure to enhance the security concepts of communication systems and the dynamic vendor ecosystem. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cybersecurity Issues and Challenges in Civil Aviation Security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Smart Logistics Using Smart Technologies |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Global Navigation Satellite Systems for Logistics |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10592084 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 363.287 (Online Access) | EB0108 | e-Books |