Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to under...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | BTU01 FAW01 |
Zusammenfassung: | As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (460 pages) Illustrationen, Diagramme |
ISBN: | 9780124201842 9780124201149 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043615387 | ||
003 | DE-604 | ||
005 | 20200904 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124201842 |9 978-0-12-420184-2 | ||
020 | |a 9780124201149 |c Print |9 978-0-12-420114-9 | ||
035 | |a (ZDB-30-PQE)EBC1887712 | ||
035 | |a (ZDB-89-EBL)EBL1887712 | ||
035 | |a (ZDB-38-EBR)ebr10999674 | ||
035 | |a (OCoLC)898069530 | ||
035 | |a (DE-599)BVBBV043615387 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-634 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Knapp, Eric D. |e Verfasser |0 (DE-588)1124809031 |4 aut | |
245 | 1 | 0 | |a Industrial Network Security |b Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
250 | |a 2nd ed | ||
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (460 pages) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Process control -- Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SCADA |g Programm |0 (DE-588)4571010-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Corporate Network |0 (DE-588)4402944-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Corporate Network |0 (DE-588)4402944-5 |D s |
689 | 0 | 2 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 3 | |a SCADA |g Programm |0 (DE-588)4571010-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Langill, Joel Thomas |e Sonstige |0 (DE-588)1124810013 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Knapp, Eric D |t . Industrial Network Security : Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
912 | |a ZDB-30-PQE |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029029446 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124201149 |l BTU01 |p ZDB-33-EBS |q BTU_PDA_EBS_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124201149 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176357997936640 |
---|---|
any_adam_object | |
author | Knapp, Eric D. |
author_GND | (DE-588)1124809031 (DE-588)1124810013 |
author_facet | Knapp, Eric D. |
author_role | aut |
author_sort | Knapp, Eric D. |
author_variant | e d k ed edk |
building | Verbundindex |
bvnumber | BV043615387 |
classification_rvk | ST 277 |
collection | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-30-PQE)EBC1887712 (ZDB-89-EBL)EBL1887712 (ZDB-38-EBR)ebr10999674 (OCoLC)898069530 (DE-599)BVBBV043615387 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03645nmm a2200565zc 4500</leader><controlfield tag="001">BV043615387</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200904 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201842</subfield><subfield code="9">978-0-12-420184-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201149</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-420114-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1887712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1887712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10999674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898069530</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043615387</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knapp, Eric D.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1124809031</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Industrial Network Security</subfield><subfield code="b">Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (460 pages)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Process control -- Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Corporate Network</subfield><subfield code="0">(DE-588)4402944-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">SCADA</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4571010-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Langill, Joel Thomas</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1124810013</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Knapp, Eric D</subfield><subfield code="t">. Industrial Network Security : Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029029446</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124201149</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-33-EBS</subfield><subfield code="q">BTU_PDA_EBS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124201149</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043615387 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:54Z |
institution | BVB |
isbn | 9780124201842 9780124201149 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029029446 |
oclc_num | 898069530 |
open_access_boolean | |
owner | DE-1046 DE-634 |
owner_facet | DE-1046 DE-634 |
physical | 1 online resource (460 pages) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS ZDB-33-EBS BTU_PDA_EBS_Kauf ZDB-33-ESD FAW_PDA_ESD_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Knapp, Eric D. Verfasser (DE-588)1124809031 aut Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems 2nd ed Saint Louis Elsevier Science 2014 © 2015 1 online resource (460 pages) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering Computer security Process control -- Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf SCADA Programm (DE-588)4571010-7 gnd rswk-swf Corporate Network (DE-588)4402944-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Corporate Network (DE-588)4402944-5 s Intelligentes Stromnetz (DE-588)7708028-2 s SCADA Programm (DE-588)4571010-7 s DE-604 Langill, Joel Thomas Sonstige (DE-588)1124810013 oth Erscheint auch als Druck-Ausgabe Knapp, Eric D . Industrial Network Security : Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
spellingShingle | Knapp, Eric D. Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Computer security Process control -- Security measures Computersicherheit (DE-588)4274324-2 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd SCADA Programm (DE-588)4571010-7 gnd Corporate Network (DE-588)4402944-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7708028-2 (DE-588)4571010-7 (DE-588)4402944-5 |
title | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_auth | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_exact_search | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_full | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_fullStr | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_full_unstemmed | Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
title_short | Industrial Network Security |
title_sort | industrial network security securing critical infrastructure networks for smart grid scada and other industrial control systems |
title_sub | Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
topic | Computer security Process control -- Security measures Computersicherheit (DE-588)4274324-2 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd SCADA Programm (DE-588)4571010-7 gnd Corporate Network (DE-588)4402944-5 gnd |
topic_facet | Computer security Process control -- Security measures Computersicherheit Intelligentes Stromnetz SCADA Programm Corporate Network |
work_keys_str_mv | AT knappericd industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems AT langilljoelthomas industrialnetworksecuritysecuringcriticalinfrastructurenetworksforsmartgridscadaandotherindustrialcontrolsystems |