|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_ocn941068872 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130311s2013 ncua ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e rda
|e pn
|c IDEBK
|d OCLCO
|d OCLCQ
|d LTP
|d OCLCQ
|d OCLCF
|d YDX
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1941546080
|q (ebk)
|
020 |
|
|
|a 9781941546086
|q (electronic bk.)
|
020 |
|
|
|z 1937560635
|
035 |
|
|
|a (OCoLC)941068872
|
037 |
|
|
|a 898083
|b MIL
|
050 |
|
4 |
|a T59.5
|b .K75 2013eb
|
082 |
0 |
4 |
|a 629.8/9558
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krutz, Ronald L.,
|d 1938-
|
245 |
1 |
0 |
|a Industrial automation and control system security principles /
|c Ronald L. Krutz, Ph. D., P.E.
|
264 |
|
1 |
|a Research Triangle Park, NC :
|b International Society of Automation (ISA),
|c [2013]
|
300 |
|
|
|a 1 online resource (xviii, 428 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 415-418) and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The use of cyber warfare as a prelude or substitute for conventional attacks has gone from conjecture to reality. The obvious targets of such assaults are a nation's defense establishment, critical infrastructure, and production capabilities. Contrary to popular opinion, there are effective, structured defenses against such aggression, if they are conscientiously and properly implemented and maintained. This text merges the fundamentals of information system security and the unique requirements of industrial automation and control systems and presents a clear and implementable formula to defend crucial elements, such as refineries, chemical plants, manufacturing operations, power plants and pipelines. This work develops a novel protection approach based on the merging of the best relevant and proven government and industry standards, resulting in a practical instrument that can be straightforwardly applied to secure our valuable resources.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Automation
|x Security measures.
|
650 |
|
0 |
|a Process control
|x Security measures.
|
650 |
|
0 |
|a Industries
|x Security measures.
|
650 |
|
6 |
|a Automatisation
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Fabrication
|x Contrôle
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Industrie
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Automation
|x Security measures
|2 fast
|
650 |
|
7 |
|a Industries
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781941546086
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1194170
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300990618
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis34019160
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1194170
|
994 |
|
|
|a 92
|b IZTAP
|