000 03628nam a22003855i 4500
001 312674
003 MX-SnUAN
005 20160429160606.0
007 cr nn 008mamaa
008 150903s2010 ne | o |||| 0|eng d
020 _a9789048135943
_99789048135943
024 7 _a10.1007/9789048135943
_2doi
035 _avtls000365397
039 9 _a201509030652
_bVLOAD
_c201405070412
_dVLOAD
_y201402211251
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aTK1001-1841
100 1 _aLukszo, Zofia.
_eeditor.
_9354517
245 1 0 _aSecuring Electricity Supply in the Cyber Age :
_bExploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure /
_cedited by Zofia Lukszo, Geert Deconinck, Margot P. C. Weijnen.
264 1 _aDordrecht :
_bSpringer Netherlands,
_c2010.
300 _avI, 187 páginas
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aTopics in Safety, Risk, Reliability and Quality,
_x1566-0443 ;
_v15
500 _aSpringer eBooks
520 _aThe electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. These problems were addressed at an advanced research workshop, titled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT", which was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. This book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aDeconinck, Geert.
_eeditor.
_9354518
700 1 _aWeijnen, Margot P. C.
_eeditor.
_9354519
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9789048135936
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-90-481-3594-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c312674
_d312674