Cybersecurity of industrial systems:
How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by atta...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
ISTE
2019
|
Schriftenreihe: | Systems and industrial engineering series
|
Schlagworte: | |
Zusammenfassung: | How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions. Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems |
Beschreibung: | XXIX, 379 Seiten Illustrationen, Diagramme |
ISBN: | 9781786304216 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046189302 | ||
003 | DE-604 | ||
005 | 20200114 | ||
007 | t | ||
008 | 191009s2019 a||| |||| 00||| eng d | ||
020 | |a 9781786304216 |9 978-1-78630-421-6 | ||
035 | |a (OCoLC)1135504149 | ||
035 | |a (DE-599)BVBBV046189302 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-862 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Flaus, Jean-Marie |e Verfasser |0 (DE-588)1202809421 |4 aut | |
245 | 1 | 0 | |a Cybersecurity of industrial systems |c Jean-Marie Flaus |
264 | 1 | |a London |b ISTE |c 2019 | |
300 | |a XXIX, 379 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Systems and industrial engineering series | |
520 | 3 | |a How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions. Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Industrie |0 (DE-588)4026779-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaft |0 (DE-588)4066399-1 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a TECHNOLOGY & ENGINEERING / Telecommunications | |
653 | 0 | |a Computer networks / Security measures | |
653 | 6 | |a Electronic books | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Industrie |0 (DE-588)4026779-9 |D s |
689 | 0 | 2 | |a Wirtschaft |0 (DE-588)4066399-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 1119644534 |
999 | |a oai:aleph.bib-bvb.de:BVB01-031568689 |
Datensatz im Suchindex
DE-BY-862_location | 2000 |
---|---|
DE-BY-FWS_call_number | 2000/ST 277 F587 |
DE-BY-FWS_katkey | 737603 |
DE-BY-FWS_media_number | 083000522918 |
_version_ | 1806176560563093504 |
any_adam_object | |
author | Flaus, Jean-Marie |
author_GND | (DE-588)1202809421 |
author_facet | Flaus, Jean-Marie |
author_role | aut |
author_sort | Flaus, Jean-Marie |
author_variant | j m f jmf |
building | Verbundindex |
bvnumber | BV046189302 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1135504149 (DE-599)BVBBV046189302 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02438nam a2200481 c 4500</leader><controlfield tag="001">BV046189302</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200114 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">191009s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781786304216</subfield><subfield code="9">978-1-78630-421-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1135504149</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046189302</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Flaus, Jean-Marie</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202809421</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity of industrial systems</subfield><subfield code="c">Jean-Marie Flaus</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">ISTE</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 379 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Systems and industrial engineering series</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions. Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. The book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Industrie</subfield><subfield code="0">(DE-588)4026779-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Industrie</subfield><subfield code="0">(DE-588)4026779-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Wirtschaft</subfield><subfield code="0">(DE-588)4066399-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">1119644534</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031568689</subfield></datafield></record></collection> |
id | DE-604.BV046189302 |
illustrated | Illustrated |
indexdate | 2024-08-01T11:23:16Z |
institution | BVB |
isbn | 9781786304216 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031568689 |
oclc_num | 1135504149 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS |
physical | XXIX, 379 Seiten Illustrationen, Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | ISTE |
record_format | marc |
series2 | Systems and industrial engineering series |
spellingShingle | Flaus, Jean-Marie Cybersecurity of industrial systems Computersicherheit (DE-588)4274324-2 gnd Industrie (DE-588)4026779-9 gnd Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd Wirtschaft (DE-588)4066399-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4026779-9 (DE-588)4010452-7 (DE-588)4011144-1 (DE-588)4066399-1 |
title | Cybersecurity of industrial systems |
title_auth | Cybersecurity of industrial systems |
title_exact_search | Cybersecurity of industrial systems |
title_full | Cybersecurity of industrial systems Jean-Marie Flaus |
title_fullStr | Cybersecurity of industrial systems Jean-Marie Flaus |
title_full_unstemmed | Cybersecurity of industrial systems Jean-Marie Flaus |
title_short | Cybersecurity of industrial systems |
title_sort | cybersecurity of industrial systems |
topic | Computersicherheit (DE-588)4274324-2 gnd Industrie (DE-588)4026779-9 gnd Computerkriminalität (DE-588)4010452-7 gnd Datensicherung (DE-588)4011144-1 gnd Wirtschaft (DE-588)4066399-1 gnd |
topic_facet | Computersicherheit Industrie Computerkriminalität Datensicherung Wirtschaft |
work_keys_str_mv | AT flausjeanmarie cybersecurityofindustrialsystems |
THWS Schweinfurt Zentralbibliothek Lesesaal
Signatur: |
2000 ST 277 F587 |
---|---|
Exemplar 1 | ausleihbar Verfügbar Bestellen |