Cargando…

Cybersecurity for industrial control systems /

SCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external I...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Macaulay, Tyson
Otros Autores: Singer, Bryan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, Fla : Auerbach, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn809742633
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 090105s2012 flua o 000 0 eng d
040 |a UKBOL  |b eng  |e pn  |c UKBOL  |d OCLCO  |d NLE  |d EBLCP  |d MHW  |d DEBSZ  |d OCLCQ  |d IDB  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 804664118 
020 |a 1439801983 
020 |a 9781439801987 
029 1 |a AU@  |b 000055826712 
029 1 |a DEBSZ  |b 397191820 
029 1 |a DEBSZ  |b 431076359 
029 1 |a GBVCP  |b 738752878 
029 1 |a AU@  |b 000066751704 
035 |a (OCoLC)809742633  |z (OCoLC)804664118 
050 4 |a TS156.8  |b .M328 2012 
082 0 4 |a 629.8028558  |2 22 
049 |a UAMI 
100 1 |a Macaulay, Tyson. 
245 1 0 |a Cybersecurity for industrial control systems /  |c Tyson Macaulay and Bryan Singer. 
260 |a Boca Raton, Fla :  |b Auerbach,  |c 2012. 
300 |a 1 online resource (x, 185 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Title Page; Copyright; Contents; AUTHORS; CHAPTER 1: INTRODUCTION; CHAPTER 2: THREATS TO ICS; CHAPTER 3: ICS VULNERABILITIES; CHAPTER 4: RISK ASSESSMENT TECHNIQUES; CHAPTER 5: WHAT IS NEXT IN ICS SECURITY?; INDEX. 
520 |a SCADA - Supervisory Control and Data Acquisition - Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed 'cookbook' that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Automatic control  |x Security measures. 
650 0 |a Supervisory control systems  |x Security measures. 
650 6 |a Commande automatique  |x Sécurité  |x Mesures. 
650 6 |a Commande supervisée  |x Sécurité  |x Mesures. 
700 1 |a Singer, Bryan. 
758 |i has work:  |a Cybersecurity for industrial control systems (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFW3BtF6k6Fr3DcJVJJJQm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 |c Hardback  |z 9781439801963 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=826923  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL826923 
994 |a 92  |b IZTAP