|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1088352754 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190223s2015 fr o 000 0 fre d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d CHVBK
|d OCLCO
|d OCLCF
|d OCLCQ
|d UEJ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1087867418
|
020 |
|
|
|a 9782364934771
|
020 |
|
|
|a 236493477X
|
029 |
1 |
|
|a AU@
|b 000065980465
|
029 |
1 |
|
|a CHNEW
|b 001040429
|
029 |
1 |
|
|a CHVBK
|b 55904092X
|
035 |
|
|
|a (OCoLC)1088352754
|z (OCoLC)1087867418
|
050 |
|
4 |
|a QA76.9.A25
|b .C934 2015
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kobes, Pierre.
|
245 |
1 |
0 |
|a Cybersécurité des Installations Industrielles
|
260 |
|
|
|a TOULOUSE :
|b Cepadues Editions,
|c 2015.
|
300 |
|
|
|a 1 online resource (38 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro; SOMMAIRE; Chapitre XV; Zoom sur la norme internationale IEC 62443 pour la cybersécurité des systèmes numériques industriels; 1. Champ d'application de l'IEC 62443; 2. Structure de l'IEC 62443; 3. Concepts de l'IEC 62443; 3.1 Défense en profondeur; 3.2 Évaluation du risque; 3.3 Cycles de vie des produits et des installations; 3.4 Niveaux de sécurité SL; 3.4 Les autres dimensions influant sur la protection; 4. Les documents en détail; 4.1 Partie 1 : General; IEC 62443-1-1, Terminology, concepts and models; IEC 62443-1-2 Master glossary of terms and abbreviations
|
505 |
8 |
|
|a IEC 62443-1-3 System security compliance metrics4.2 Partie 2 : Policies and procedures; IEC 62443-2-1 Requirements for an IACS security management system; IEC 62443-2-3 Patch management in the IACS environment; IEC 62443-2-4 Requirements for IACS solution suppliers; 4.3 Partie 3 : System; IEC 62443-3-1 Security technologies for IACS; IEC 62443-3-2 Security risk assessment and system design; IEC 62443-3-3 System security requirements and Security levels; 4.4 Partie 4 : Component; IEC 62443-4-1 Product development requirements; IEC 62443-4-2 Technical security requirements for IACS products
|
500 |
|
|
|a 5. En guide de conclusion : Considérations sur l'évaluation du niveau de protection
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Kobes, Pierre.
|t Cybersécurité des Installations Industrielles.
|d TOULOUSE : Cepadues Editions, ©2015
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5709812
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5709812
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16065678
|
994 |
|
|
|a 92
|b IZTAP
|