Securing Critical Infrastructures and Critical Control Systems

Approaches for Threat Protection

Nonfiction, Computers, Internet, Security, Application Software, Computer Security, General Computing
Cover of the book Securing Critical Infrastructures and Critical Control Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466627529
Publisher: IGI Global Publication: December 31, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466627529
Publisher: IGI Global
Publication: December 31, 2012
Imprint: Information Science Reference
Language: English
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

More books from IGI Global

Cover of the book Contemporary Theory and Pragmatic Approaches in Fuzzy Computing Utilization by
Cover of the book Effective Methods for Modern Healthcare Service Quality and Evaluation by
Cover of the book Impact of Medical Errors and Malpractice on Health Economics, Quality, and Patient Safety by
Cover of the book Smart Devices, Applications, and Protocols for the IoT by
Cover of the book Handbook of Research on Comparative Economic Development Perspectives on Europe and the MENA Region by
Cover of the book Modern Software Engineering Methodologies for Mobile and Cloud Environments by
Cover of the book IT Policy and Ethics by
Cover of the book Examining the Potential for Response to Intervention (RTI) Delivery Models in Secondary Education by
Cover of the book Enterprise IT Governance, Business Value and Performance Measurement by
Cover of the book Intelligent Computer Vision and Image Processing by
Cover of the book Contemporary Approaches to Dissertation Development and Research Methods by
Cover of the book Microbial Cultures and Enzymes in Dairy Technology by
Cover of the book Strategic Marketing in Fragile Economic Conditions by
Cover of the book Internet Accessible Remote Laboratories by
Cover of the book Advancing Teacher Education and Curriculum Development through Study Abroad Programs by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy