Techno security's guide to securing SCADA:
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the m...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. Oxford
Syngress Elsevier Science [distributor]
© 2007
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field |
Beschreibung: | "A comprehensive handbook on protecting the critical infrastructure"--Cover Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxiv, 325 pages) illustrations |
ISBN: | 9781597492829 1597492825 9780080569994 0080569994 1281762962 9781281762962 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124770 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597492829 |9 978-1-59749-282-9 | ||
020 | |a 1597492825 |9 1-59749-282-5 | ||
020 | |a 9780080569994 |9 978-0-08-056999-4 | ||
020 | |a 0080569994 |9 0-08-056999-4 | ||
020 | |a 1281762962 |9 1-281-76296-2 | ||
020 | |a 9781281762962 |9 978-1-281-76296-2 | ||
035 | |a (ZDB-33-ESD)ocn272382248 | ||
035 | |a (OCoLC)272382248 | ||
035 | |a (DE-599)BVBBV046124770 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 620.46028558 |2 22 | |
100 | 1 | |a Wiles, Jack |e Verfasser |4 aut | |
245 | 1 | 0 | |a Techno security's guide to securing SCADA |c Jack Wiles [and others] ; foreword by Amit Yoran |
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress |b Elsevier Science [distributor] |c © 2007 | |
300 | |a 1 online resource (xxiv, 325 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "A comprehensive handbook on protecting the critical infrastructure"--Cover | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. | ||
520 | |a Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. | ||
520 | |a * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Automation |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Robotics |2 bisacsh | |
650 | 7 | |a Supervisory control systems / Security measures |2 blmlsh | |
650 | 7 | |a Automatic data collection systems / Security measures |2 blmlsh | |
650 | 7 | |a Infrastructure (Economics) / Security measures |2 blmlsh | |
650 | 4 | |a Supervisory control systems |x Security measures | |
650 | 4 | |a Automatic data collection systems |x Security measures | |
650 | 4 | |a Infrastructure (Economics) |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492829 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505224 | ||
347 | |a text file |2 rda | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597492829 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443138883584 |
---|---|
any_adam_object | |
author | Wiles, Jack |
author_facet | Wiles, Jack |
author_role | aut |
author_sort | Wiles, Jack |
author_variant | j w jw |
building | Verbundindex |
bvnumber | BV046124770 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn272382248 (OCoLC)272382248 (DE-599)BVBBV046124770 |
dewey-full | 620.46028558 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 620 - Engineering and allied operations |
dewey-raw | 620.46028558 |
dewey-search | 620.46028558 |
dewey-sort | 3620.46028558 |
dewey-tens | 620 - Engineering and allied operations |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04291nmm a2200529zc 4500</leader><controlfield tag="001">BV046124770</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492829</subfield><subfield code="9">978-1-59749-282-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492825</subfield><subfield code="9">1-59749-282-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080569994</subfield><subfield code="9">978-0-08-056999-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080569994</subfield><subfield code="9">0-08-056999-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281762962</subfield><subfield code="9">1-281-76296-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281762962</subfield><subfield code="9">978-1-281-76296-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn272382248</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)272382248</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124770</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">620.46028558</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Techno security's guide to securing SCADA</subfield><subfield code="c">Jack Wiles [and others] ; foreword by Amit Yoran</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">© 2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 325 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A comprehensive handbook on protecting the critical infrastructure"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Automation</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Robotics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Supervisory control systems / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Automatic data collection systems / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Infrastructure (Economics) / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Supervisory control systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automatic data collection systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492829</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505224</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597492829</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124770 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781597492829 1597492825 9780080569994 0080569994 1281762962 9781281762962 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505224 |
oclc_num | 272382248 |
open_access_boolean | |
physical | 1 online resource (xxiv, 325 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Elsevier Science [distributor] |
record_format | marc |
spelling | Wiles, Jack Verfasser aut Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran Rockland, Mass. Oxford Syngress Elsevier Science [distributor] © 2007 1 online resource (xxiv, 325 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "A comprehensive handbook on protecting the critical infrastructure"--Cover Includes bibliographical references and index Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Supervisory control systems / Security measures blmlsh Automatic data collection systems / Security measures blmlsh Infrastructure (Economics) / Security measures blmlsh Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures http://www.sciencedirect.com/science/book/9781597492829 Verlag URL des Erstveröffentlichers Volltext text file rda |
spellingShingle | Wiles, Jack Techno security's guide to securing SCADA TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Supervisory control systems / Security measures blmlsh Automatic data collection systems / Security measures blmlsh Infrastructure (Economics) / Security measures blmlsh Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures |
title | Techno security's guide to securing SCADA |
title_auth | Techno security's guide to securing SCADA |
title_exact_search | Techno security's guide to securing SCADA |
title_full | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_fullStr | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_full_unstemmed | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_short | Techno security's guide to securing SCADA |
title_sort | techno security s guide to securing scada |
topic | TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Supervisory control systems / Security measures blmlsh Automatic data collection systems / Security measures blmlsh Infrastructure (Economics) / Security measures blmlsh Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Automation TECHNOLOGY & ENGINEERING / Robotics Supervisory control systems / Security measures Automatic data collection systems / Security measures Infrastructure (Economics) / Security measures Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures |
url | http://www.sciencedirect.com/science/book/9781597492829 |
work_keys_str_mv | AT wilesjack technosecuritysguidetosecuringscada |