Industrial network security: securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Syngress
2011
|
Schlagworte: | |
Online-Zugang: | FUBA1 Volltext |
Beschreibung: | Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate. Covers implementation guidelines for security measures of Critical Infrastructure Applies the security measures for system-specific compliance Discusses common pitfalls and mistakes and how to avoid them "This book attempts to define an approach to industrial network security that considers the unique network, protocol and application characteristics of an industrial control system, while also taking into consideration a variety of common compliance controls"-- Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (XVII, 341 S.) Ill., graph. Darst. |
ISBN: | 9781597496469 1597496464 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314282 | ||
003 | DE-604 | ||
005 | 20210823 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496469 |c electronic bk. |9 978-1-59749-646-9 | ||
020 | |a 1597496464 |c electronic bk. |9 1-59749-646-4 | ||
024 | 7 | |a 10.1016/C2010-0-66555-2 |2 doi | |
035 | |a (ZDB-33-EBS)ocn746501207 | ||
035 | |a (OCoLC)746501207 | ||
035 | |a (DE-599)BVBBV042314282 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 670.42/7 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Knapp, Eric D. |e Verfasser |0 (DE-588)1124809031 |4 aut | |
245 | 1 | 0 | |a Industrial network security |b securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |c Eric Knapp |
264 | 1 | |a Amsterdam [u.a.] |b Syngress |c 2011 | |
300 | |a 1 Online-Ressource (XVII, 341 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary | ||
500 | |a For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate. Covers implementation guidelines for security measures of Critical Infrastructure Applies the security measures for system-specific compliance Discusses common pitfalls and mistakes and how to avoid them | ||
500 | |a "This book attempts to define an approach to industrial network security that considers the unique network, protocol and application characteristics of an industrial control system, while also taking into consideration a variety of common compliance controls"-- | ||
500 | |a Includes bibliographical references | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Industrial Engineering |2 bisacsh | |
650 | 4 | |a Process control |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SCADA |g Programm |0 (DE-588)4571010-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Corporate Network |0 (DE-588)4402944-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Corporate Network |0 (DE-588)4402944-5 |D s |
689 | 0 | 2 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 3 | |a SCADA |g Programm |0 (DE-588)4571010-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59749-645-2 |w (DE-604)BV039695065 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59749-645-6 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496452 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751273 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496452 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2012 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907267833856 |
---|---|
any_adam_object | |
author | Knapp, Eric D. |
author_GND | (DE-588)1124809031 |
author_facet | Knapp, Eric D. |
author_role | aut |
author_sort | Knapp, Eric D. |
author_variant | e d k ed edk |
building | Verbundindex |
bvnumber | BV042314282 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn746501207 (OCoLC)746501207 (DE-599)BVBBV042314282 |
dewey-full | 670.42/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 670 - Manufacturing |
dewey-raw | 670.42/7 |
dewey-search | 670.42/7 |
dewey-sort | 3670.42 17 |
dewey-tens | 670 - Manufacturing |
discipline | Informatik Werkstoffwissenschaften / Fertigungstechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04066nmm a2200613zc 4500</leader><controlfield tag="001">BV042314282</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210823 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496469</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-646-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496464</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-646-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2010-0-66555-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn746501207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)746501207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314282</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">670.42/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knapp, Eric D.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1124809031</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Industrial network security</subfield><subfield code="b">securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems</subfield><subfield code="c">Eric Knapp</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 341 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate. Covers implementation guidelines for security measures of Critical Infrastructure Applies the security measures for system-specific compliance Discusses common pitfalls and mistakes and how to avoid them</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book attempts to define an approach to industrial network security that considers the unique network, protocol and application characteristics of an industrial control system, while also taking into consideration a variety of common compliance controls"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Industrial Engineering</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Process control</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59749-645-2</subfield><subfield code="w">(DE-604)BV039695065</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59749-645-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496452</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751273</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496452</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2012</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314282 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597496469 1597496464 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751273 |
oclc_num | 746501207 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (XVII, 341 S.) Ill., graph. Darst. |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2012 |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Knapp, Eric D. Verfasser (DE-588)1124809031 aut Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp Amsterdam [u.a.] Syngress 2011 1 Online-Ressource (XVII, 341 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate. Covers implementation guidelines for security measures of Critical Infrastructure Applies the security measures for system-specific compliance Discusses common pitfalls and mistakes and how to avoid them "This book attempts to define an approach to industrial network security that considers the unique network, protocol and application characteristics of an industrial control system, while also taking into consideration a variety of common compliance controls"-- Includes bibliographical references TECHNOLOGY & ENGINEERING / Industrial Engineering bisacsh Process control Security measures Computer security Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf SCADA Programm (DE-588)4571010-7 gnd rswk-swf Corporate Network (DE-588)4402944-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Computersicherheit (DE-588)4274324-2 s Corporate Network (DE-588)4402944-5 s Intelligentes Stromnetz (DE-588)7708028-2 s SCADA Programm (DE-588)4571010-7 s 1\p DE-604 Erscheint auch als Druck-Ausgabe 978-1-59749-645-2 (DE-604)BV039695065 Erscheint auch als Druck-Ausgabe 1-59749-645-6 http://www.sciencedirect.com/science/book/9781597496452 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Knapp, Eric D. Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems TECHNOLOGY & ENGINEERING / Industrial Engineering bisacsh Process control Security measures Computer security Intelligentes Stromnetz (DE-588)7708028-2 gnd SCADA Programm (DE-588)4571010-7 gnd Corporate Network (DE-588)4402944-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7708028-2 (DE-588)4571010-7 (DE-588)4402944-5 (DE-588)4274324-2 |
title | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
title_auth | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
title_exact_search | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
title_full | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp |
title_fullStr | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp |
title_full_unstemmed | Industrial network security securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp |
title_short | Industrial network security |
title_sort | industrial network security securing critical infrastructure networks for smart grid scada and other industrial control systems |
title_sub | securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
topic | TECHNOLOGY & ENGINEERING / Industrial Engineering bisacsh Process control Security measures Computer security Intelligentes Stromnetz (DE-588)7708028-2 gnd SCADA Programm (DE-588)4571010-7 gnd Corporate Network (DE-588)4402944-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Industrial Engineering Process control Security measures Computer security Intelligentes Stromnetz SCADA Programm Corporate Network Computersicherheit |
url | http://www.sciencedirect.com/science/book/9781597496452 |
work_keys_str_mv | AT knappericd industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems |