Cargando…

Industrial automation and control system security principles /

The use of cyber warfare as a prelude or substitute for conventional attacks has gone from conjecture to reality. The obvious targets of such assaults are a nation's defense establishment, critical infrastructure, and production capabilities. Contrary to popular opinion, there are effective, st...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Krutz, Ronald L., 1938-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Research Triangle Park, NC : International Society of Automation (ISA), [2013]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBSCO_ocn941068872
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 130311s2013 ncua ob 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d OCLCO  |d OCLCQ  |d LTP  |d OCLCQ  |d OCLCF  |d YDX  |d N$T  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 1941546080  |q (ebk) 
020 |a 9781941546086  |q (electronic bk.) 
020 |z 1937560635 
035 |a (OCoLC)941068872 
037 |a 898083  |b MIL 
050 4 |a T59.5  |b .K75 2013eb 
082 0 4 |a 629.8/9558  |2 23 
049 |a UAMI 
100 1 |a Krutz, Ronald L.,  |d 1938- 
245 1 0 |a Industrial automation and control system security principles /  |c Ronald L. Krutz, Ph. D., P.E. 
264 1 |a Research Triangle Park, NC :  |b International Society of Automation (ISA),  |c [2013] 
300 |a 1 online resource (xviii, 428 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 415-418) and index. 
588 0 |a Print version record. 
520 |a The use of cyber warfare as a prelude or substitute for conventional attacks has gone from conjecture to reality. The obvious targets of such assaults are a nation's defense establishment, critical infrastructure, and production capabilities. Contrary to popular opinion, there are effective, structured defenses against such aggression, if they are conscientiously and properly implemented and maintained. This text merges the fundamentals of information system security and the unique requirements of industrial automation and control systems and presents a clear and implementable formula to defend crucial elements, such as refineries, chemical plants, manufacturing operations, power plants and pipelines. This work develops a novel protection approach based on the merging of the best relevant and proven government and industry standards, resulting in a practical instrument that can be straightforwardly applied to secure our valuable resources. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Automation  |x Security measures. 
650 0 |a Process control  |x Security measures. 
650 0 |a Industries  |x Security measures. 
650 6 |a Automatisation  |x Sécurité  |x Mesures. 
650 6 |a Fabrication  |x Contrôle  |x Sécurité  |x Mesures. 
650 6 |a Industrie  |x Sécurité  |x Mesures. 
650 7 |a Automation  |x Security measures  |2 fast 
650 7 |a Industries  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 9781941546086 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1194170  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 300990618 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34019160 
938 |a EBSCOhost  |b EBSC  |n 1194170 
994 |a 92  |b IZTAP