Cargando…

Techno security's guide to securing SCADA /

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wiles, Jack
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn272382248
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 081117s2007 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d YDXCP  |d UMI  |d CEF  |d N$T  |d IDEBK  |d UBY  |d COO  |d E7B  |d NHM  |d DEBSZ  |d OCLCQ  |d FEM  |d OCLCQ  |d UAB  |d LEAUB  |d OL$  |d VLY  |d VT2  |d OCLCF  |d OCLCO  |d OCLCQ 
015 |a GBA883477  |2 bnb 
016 7 |a 014657167  |2 Uk 
019 |a 302360202  |a 354465245  |a 505085273  |a 646767338  |a 823838125  |a 823906348  |a 824095920  |a 824148510  |a 968045419  |a 969032023  |a 1044240849  |a 1056383363  |a 1075506730  |a 1097165888  |a 1162273663  |a 1192346444  |a 1240531011 
020 |a 9781597492829 
020 |a 1597492825 
020 |a 9780080569994  |q (electronic bk.) 
020 |a 0080569994  |q (electronic bk.) 
020 |a 1281762962 
020 |a 9781281762962 
020 |a 9786611762964 
020 |a 6611762965 
029 1 |a AU@  |b 000056660905 
029 1 |a CHBIS  |b 006041585 
029 1 |a CHNEW  |b 001007702 
029 1 |a CHVBK  |b 199614199 
029 1 |a DEBBG  |b BV042305739 
029 1 |a DEBSZ  |b 355443899 
029 1 |a DEBSZ  |b 407380434 
029 1 |a DEBSZ  |b 434147656 
029 1 |a HEBIS  |b 291514197 
029 1 |a NZ1  |b 13068742 
029 1 |a NZ1  |b 15189679 
035 |a (OCoLC)272382248  |z (OCoLC)302360202  |z (OCoLC)354465245  |z (OCoLC)505085273  |z (OCoLC)646767338  |z (OCoLC)823838125  |z (OCoLC)823906348  |z (OCoLC)824095920  |z (OCoLC)824148510  |z (OCoLC)968045419  |z (OCoLC)969032023  |z (OCoLC)1044240849  |z (OCoLC)1056383363  |z (OCoLC)1075506730  |z (OCoLC)1097165888  |z (OCoLC)1162273663  |z (OCoLC)1192346444  |z (OCoLC)1240531011 
037 |a 156285:156447  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TJ222  |b .W55 2007eb 
072 7 |a TEC  |x 004000  |2 bisacsh 
072 7 |a TEC  |x 037000  |2 bisacsh 
072 7 |a UTN  |2 bicssc 
082 0 4 |a 620.46028558  |2 22 
049 |a UAMI 
100 1 |a Wiles, Jack. 
245 1 0 |a Techno security's guide to securing SCADA /  |c Jack Wiles [and others] ; foreword by Amit Yoran. 
260 |a Rockland, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c ©2007. 
300 |a 1 online resource (xxiv, 325 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field 
505 0 |a Foreword -- Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability -- Chapter 2: Supervisory Control and Data Acquisition -- Chapter 3: SCADA Security Assessment Methodology -- Chapter 4: Developing an Effective Security Awareness Program -- Chapter 5: Working with Law Enforcement on SCADA Incidents -- Chapter 6:Locked but Not Secure: An Overview of Conventional and High Security Locks -- Chapter 7: Bomb Threat Planning: Things Have Changed -- Chapter 8: Biometric Authentication for SCADA Security -- Appendix: Personal, Workforce, and Family Preparedness -- Index. 
500 |a "A comprehensive handbook on protecting the critical infrastructure"--Cover 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Supervisory control systems  |x Security measures. 
650 0 |a Automatic data collection systems  |x Security measures. 
650 0 |a Infrastructure (Economics)  |x Security measures. 
650 6 |a Commande supervisée  |x Sécurité  |x Mesures. 
650 6 |a Collecte automatique des données  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Automation.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Robotics.  |2 bisacsh 
650 7 |a Supervisory control systems  |x Security measures.  |2 blmlsh 
650 7 |a Automatic data collection systems  |x Security measures.  |2 blmlsh 
650 7 |a Infrastructure (Economics)  |x Security measures.  |2 blmlsh 
650 7 |a Infrastructure (Economics)  |x Security measures.  |2 fast  |0 (OCoLC)fst02031379 
776 0 8 |i Print version:  |a Wiles, Jack.  |t Techno security's guide to securing SCADA.  |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], ©2007  |z 9781597492829  |z 1597492825  |w (DLC) 2008298874  |w (OCoLC)247964481 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492829/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10254618 
938 |a EBSCOhost  |b EBSC  |n 239213 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 176296 
938 |a YBP Library Services  |b YANK  |n 2907526 
994 |a 92  |b IZTAP