Cyber-security of SCADA and Other Industrial Control Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber-security of SCADA and Other Industrial Control Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319321257
Publisher: Springer International Publishing Publication: August 23, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319321257
Publisher: Springer International Publishing
Publication: August 23, 2016
Imprint: Springer
Language: English

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

More books from Springer International Publishing

Cover of the book Feminism and the Western in Film and Television by
Cover of the book Analytical Design of PID Controllers by
Cover of the book Land and Credit by
Cover of the book The Business of Banking by
Cover of the book Biogeochemical Transformations in the Baltic Sea by
Cover of the book Mycobacterial Skin Infections by
Cover of the book Achieving Sustainable Business Excellence by
Cover of the book Paranoid Pedagogies by
Cover of the book Pattern Recognition and Image Analysis by
Cover of the book Heterodox Investment Theory by
Cover of the book Disordered Vertebral and Rib Morphology in Pudgy Mice by
Cover of the book Human Dignity of the Vulnerable in the Age of Rights by
Cover of the book Transfer Pricing in SMEs by
Cover of the book Numerical Simulation and Experimental Investigation of the Fracture Behaviour of an Electron Beam Welded Steel Joint by
Cover of the book Handbook of Trace Analysis by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy