|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1236264604 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210206s2021 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d NTE
|d OCLCA
|d REDDC
|d OCLCF
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781593705053
|
020 |
|
|
|a 1593705050
|
035 |
|
|
|a (OCoLC)1236264604
|
050 |
|
4 |
|a TJ222
|b .S539 2020
|
082 |
0 |
4 |
|a 620.46028558
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shaw, William T.
|q (William Tim)
|
245 |
1 |
0 |
|a Cybersecurity for SCADA Systems
|h [electronic resource].
|
260 |
|
|
|a OnixTransformation.OnixModel.CityOfPublication :
|b PennWell Books,
|c 2021.
|
300 |
|
|
|a 1 online resource (523 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Intro -- Contents -- Preface -- Acknowledgements -- Introduction: Industrial Automation in the Aftermath of 9/11 -- Chapter 1. The technological evolution of scada systems -- The Early History of SCADA -- Mainframes -- Minicomputers and Microprocessors -- Central Architectures -- Distributed Architectures -- Client/Server Designs -- Technological Convergence -- Ubiquitous Internet and IP Networking -- Generalized Software Architecture -- Chapter 2. Remote terminal units -- Basic Features and Functions -- Smart RTU Technology -- Top-Down and Bottom-Up Configuration -- The Emergence of PLCs
|
505 |
8 |
|
|a Legacy Protocols -- Protocol Standards -- IP-Ready RTUs and Protocols -- Chapter 3. Telecommunications technologies -- Voice-Grade (Analog) Telephony -- Commercial Voice/Data Carriers -- Options for Wireless Communications -- Digital Networking Technologies -- TCP/IP Networking. -- The Internet -- Chapter 4. Supervisory control applications -- Operating System Utilities -- SCADA System Utilities -- Program Development Tools -- Standardized APIs -- Chapter 5. Operator interface -- Access-Control Mechanisms -- Standard System Displays -- Site/Industry-Specific Displays -- Historical Trending
|
505 |
8 |
|
|a Logs and Reports -- Chapter 6. Conventional information technology -- Availability, Integrity, and Confidentiality -- Remote Access/ Connectivity -- TCP/IP Suite -- Firewalls & Routers -- Wireless LANs -- Authentication and Validation -- Encryption and Ciphers -- Chapter 7. Identifying cybersecurity vulnerabilities -- Threats and Threat Agents -- Obvious Points of Attack and Vulnerability -- Chapter 8. Malware, cyberattacks and hacking tools -- Vulnerabilities -- WEB Server/SQL Injection -- Email and Web browsing -- Malware -- Chapter 9. Physical security -- Access Controls -- Access tracking
|
505 |
8 |
|
|a Illegal-entry Alarms -- Physical Isolation of Assets: Layers of Defense -- Physical Protection of Materials and Information -- Critical Ancillary Subsystems -- Remote and Field Sites -- Chapter 10. Operational security -- Policies and Administrative Controls -- Procedures -- Operational Differences -- Training -- Recovery Procedures -- Annual Review -- Background Checks -- Chapter 11. Computer systems & Network security -- Chapter 12. Electric utility industry -- specific cybersecurity issues -- Substation Backdoors -- IP to the Substation -- TASE.2/ICCP Connections -- UCA2 (IEC61850) -- DNP3.0
|
505 |
8 |
|
|a NERC 1200/1300 Compliance -- Chapter 13. Water/ Wastewater industry -- specific cybersecurity issues -- Licensed Radio Communications -- Nonsecure Protocols -- PLC Equipment as RTUs -- Supervisory and Local Control Applications -- Municipal LANs and WANs -- Control Interfaces to Plant Control Systems -- Chapter 14. Pipeline industry -- specific cybersecurity issues -- Radio Communications -- Smart RTUs -- RTU Program Logic -- Supervisory Control Applications -- IP along the Pipeline -- Web Browsing and Email Integration -- Chapter 15. The cyberthreat to scada systems
|
500 |
|
|
|a Chapter 16. Commercial product vulnerabilities.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Automatic data collection systems.
|
650 |
|
0 |
|a Supervisory control systems.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Collecte automatique des données.
|
650 |
|
6 |
|a Commande supervisée.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Automatic data collection systems
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Supervisory control systems
|2 fast
|
758 |
|
|
|i has work:
|a Cybersecurity for SCADA systems (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFBGyfJxP6rXQy3VTpGwVK
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Shaw, William T.
|t Cybersecurity for SCADA Systems
|d OnixTransformation.OnixModel.CityOfPublication : PennWell Books,c2021
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6468131
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6468131
|
994 |
|
|
|a 92
|b IZTAP
|