暂无商品咨询信息 [发表商品咨询]
本书共8章,目标是让读者了解工业互联网安全的基本内涵、风险分析、关键技术及产品系统。第1章主要讲述工业互联网的基本概念、应用案例、体系架构、产业现状及发展趋势;第2章主要介绍工业互联网安全威胁,包括工业互联网的安全风险来源、面临的主要挑战、攻击影响、威胁发展趋势;第3章介绍工业互联网安全防护与管理,包括安全需求及目标、安全防护技术及产品等;第4 ~ 8章分别从标识解析系统、工业互联网平台、工业控制系统、边缘计算及数据的安全风险分析、防护要求及关键技术等方面,为读者剖析工业互联网安全风险、应对措施及技术发展趋势等。本书内容丰富、概念清晰、语言精练、通俗易懂,坚持理论联系实际,收集了面向产业应用的案例和知识,尽量避免过多的数学公式。本书可作为网络空间安全、信息安全、物联网、计算机科学与技术等专业的本科生教材,也可以作为广大网络安全工程师、网络管理员、工业和信息化从业人员的参考书。
第1章 工业互联网 ············································································.1
1.1 工业互联网的基本概念 ··········································································.1
1.2 工业互联网应用案例 ·············································································.3
1.3 工业互联网体系架构 ·············································································.4
1.4 工业互联网产业现状 ············································································.20
1.5 工业互联网发展趋势 ············································································.22
参考文献 ································································································.25
第2章 工业互联网安全威胁 ······························································.26
2.1 工业互联网安全风险来源 ······································································.26
2.2 工业互联网安全主要挑战 ······································································.29
2.3 工业互联网安全攻击影响 ······································································.39
2.4 工业互联网安全威胁发展趋势 ································································.40
参考文献 ································································································.44
第3章 工业互联网安全防护与管理 ·····················································.45
3.1 安全需求及目标 ··················································································.45
3.2 安全管理体系 ·····················································································.49
3.3 法律法规与指导办法 ············································································.52
3.4 安全防护技术及产品 ············································································.55
参考文献 ································································································.74
第4章 标识解析安全 ·······································································.75
4.1 工业互联网标识解析发展现状 ································································.75
4.2 工业互联网标识解析安全风险分析 ··························································.93
4.3 工业互联网标识解析安全防护建设 ························································.101
4.4 工业互联网标识解析安全关键技术 ························································.104
4.5 工业互联网标识解析安全建设的意义及展望 ············································.107
参考文献 ······························································································.109
第5章 工业互联网平台安全 ····························································.110
5.1 工业互联网平台安全风险 ····································································.110
5.2 工业互联网平台安全防护要求 ······························································.114
5.3 工业互联网平台安全措施 ····································································.117
5.4 工业互联网平台安全防御关键技术 ························································.121
5.5 工业互联网平台安全的发展意义及展望 ··················································.127
参考文献 ······························································································.129
第6章 工业控制系统安全 ·······························································.130
6.1 工业控制系统安全问题 ·······································································.130
6.2 工业控制系统安全风险 ·······································································.133
6.3 工业控制系统常见的攻击手段 ······························································.135
6.4 工业控制系统安全防护策略 ·································································.139
参考文献 ······························································································.150
第7章 工业互联网边缘计算安全 ······················································.151
7.1 工业互联网边缘计算概述 ····································································.151
7.2 工业互联网边缘计算研究现状 ······························································.152
7.3 工业互联网边缘计算面临的典型安全风险 ···············································.153
7.4 工业互联网边缘计算安全防护面临的挑战 ···············································.155
7.5 工业互联网边缘计算安全措施 ······························································.158
7.6 工业互联网边缘计算安全关键技术 ························································.160
7.7 工业互联网边缘计算安全的发展意义及展望 ············································.176
参考文献 ······························································································.177
第8章 工业互联网数据安全 ····························································.178
8.1 工业互联网数据安全概述 ····································································.178
8.2 工业互联网数据安全的发展现状 ···························································.180
8.3 工业互联网数据安全的风险点与问题分析 ···············································.181
8.4 工业互联网数据安全关键技术 ······························································.182
8.5 工业互联网数据安全新兴技术 ······························································.196
8.6 工业互联网数据安全的发展意义及展望 ··················································.204
参考文献 ······························································································.206
基本信息 | |
---|---|
出版社 | 电子工业出版社 |
ISBN | 9787121504389 |
条码 | 9787121504389 |
编者 | 蔡君等 著 |
译者 | -- |
出版年月 | 2025-07-01 00:00:00.0 |
开本 | 其他 |
装帧 | 平装 |
页数 | 212 |
字数 | |
版次 | 1 |
印次 | 1 |
纸张 | 一般胶版纸 |
暂无商品评论信息 [发表商品评论]
暂无商品咨询信息 [发表商品咨询]