Protecting industrial control systems from electronic threats /:
"Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Dat...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Momentum Press,
©2010.
|
Ausgabe: | 1st ed. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page. |
Beschreibung: | 1 online resource (ix, 327 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781606501993 1606501992 9781606501979 1606501976 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn670428503 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 101018s2010 nyua ob 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d CEF |d OCLCQ |d COO |d B24X7 |d DEBSZ |d E7B |d EBLCP |d YDXCP |d OCLCQ |d N$T |d NYMPP |d OCLCQ |d IDEBK |d OCLCF |d OCLCQ |d YDX |d AGLDB |d CPO |d Z5A |d TXI |d LIV |d OCLCQ |d MERUC |d OCLCQ |d UPM |d AU@ |d OCLCQ |d STF |d UKAHL |d OCLCQ |d AKP |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL | ||
019 | |a 959042836 |a 959042928 |a 1017927306 |a 1041588605 |a 1058759923 |a 1097106032 | ||
020 | |a 9781606501993 |q (electronic bk.) | ||
020 | |a 1606501992 |q (electronic bk.) | ||
020 | |a 9781606501979 | ||
020 | |a 1606501976 | ||
020 | |z 1606501992 | ||
020 | |z 1606501976 | ||
035 | |a (OCoLC)670428503 |z (OCoLC)959042836 |z (OCoLC)959042928 |z (OCoLC)1017927306 |z (OCoLC)1041588605 |z (OCoLC)1058759923 |z (OCoLC)1097106032 | ||
037 | |a CL0500000075 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 | |
070 | |a HD30.38 | ||
072 | 7 | |a BUS |x 082000 |2 bisacsh | |
072 | 7 | |a BUS |x 041000 |2 bisacsh | |
072 | 7 | |a BUS |x 042000 |2 bisacsh | |
072 | 7 | |a BUS |x 085000 |2 bisacsh | |
082 | 7 | |a 658.05 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Weiss, Joseph |q (Joseph M.) |1 https://id.oclc.org/worldcat/entity/E39PCjvP4fHBGr9PGGphxpwxKq |0 http://id.loc.gov/authorities/names/nb2011026778 | |
245 | 1 | 0 | |a Protecting industrial control systems from electronic threats / |c Joseph Weiss. |
250 | |a 1st ed. | ||
260 | |a New York : |b Momentum Press, |c ©2010. | ||
300 | |a 1 online resource (ix, 327 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page. | ||
505 | 0 | |a Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Industrial Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Management Science. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Behavior. |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
653 | |a Industrial Control Systems | ||
653 | |a SCADA | ||
653 | |a Process Controls | ||
653 | |a Cyber Security | ||
653 | |a Critical Infrastructure Protection | ||
653 | |a Smart Grid | ||
758 | |i has work: |a Protecting industrial control systems from electronic threats (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGDfQkxr7tmvghDhrFrhh3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Weiss, Joseph. |t Protecting industrial control systems from electronic threats. |d New York : Momentum Press, 2010 |z 9781606501979 |w (OCoLC)646810789 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501137 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501137 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26834578 | ||
938 | |a Books 24x7 |b B247 |n bks00040507 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL883392 | ||
938 | |a ebrary |b EBRY |n ebr10395191 | ||
938 | |a EBSCOhost |b EBSC |n 501137 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24444242 | ||
938 | |a Momentum Press |b NYMP |n 9781606501993 | ||
938 | |a YBP Library Services |b YANK |n 7212149 | ||
938 | |a YBP Library Services |b YANK |n 3233021 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn670428503 |
---|---|
_version_ | 1826942411813683201 |
adam_text | |
any_adam_object | |
author | Weiss, Joseph (Joseph M.) |
author_GND | http://id.loc.gov/authorities/names/nb2011026778 |
author_facet | Weiss, Joseph (Joseph M.) |
author_role | |
author_sort | Weiss, Joseph |
author_variant | j w jw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBU |
contents | Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations. |
ctrlnum | (OCoLC)670428503 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05122cam a2200781 a 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn670428503</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">101018s2010 nyua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">E7B</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">NYMPP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDX</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CPO</subfield><subfield code="d">Z5A</subfield><subfield code="d">TXI</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UPM</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AKP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">959042836</subfield><subfield code="a">959042928</subfield><subfield code="a">1017927306</subfield><subfield code="a">1041588605</subfield><subfield code="a">1058759923</subfield><subfield code="a">1097106032</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606501993</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501992</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606501979</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606501976</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1606501992</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1606501976</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670428503</subfield><subfield code="z">(OCoLC)959042836</subfield><subfield code="z">(OCoLC)959042928</subfield><subfield code="z">(OCoLC)1017927306</subfield><subfield code="z">(OCoLC)1041588605</subfield><subfield code="z">(OCoLC)1058759923</subfield><subfield code="z">(OCoLC)1097106032</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000075</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="070" ind1=" " ind2=" "><subfield code="a">HD30.38</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">082000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">042000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">085000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.05</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weiss, Joseph</subfield><subfield code="q">(Joseph M.)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvP4fHBGr9PGGphxpwxKq</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2011026778</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting industrial control systems from electronic threats /</subfield><subfield code="c">Joseph Weiss.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">Momentum Press,</subfield><subfield code="c">©2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 327 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Industrial Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Management Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Behavior.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Industrial Control Systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SCADA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Process Controls</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Critical Infrastructure Protection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smart Grid</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Protecting industrial control systems from electronic threats (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGDfQkxr7tmvghDhrFrhh3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Weiss, Joseph.</subfield><subfield code="t">Protecting industrial control systems from electronic threats.</subfield><subfield code="d">New York : Momentum Press, 2010</subfield><subfield code="z">9781606501979</subfield><subfield code="w">(OCoLC)646810789</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501137</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=501137</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26834578</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00040507</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL883392</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10395191</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">501137</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis24444242</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Momentum Press</subfield><subfield code="b">NYMP</subfield><subfield code="n">9781606501993</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7212149</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3233021</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-ocn670428503 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:27:35Z |
institution | BVB |
isbn | 9781606501993 1606501992 9781606501979 1606501976 |
language | English |
oclc_num | 670428503 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 327 pages) : illustrations |
psigel | ZDB-4-EBU FWS_PDA_EBU ZDB-4-EBU |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Momentum Press, |
record_format | marc |
spelling | Weiss, Joseph (Joseph M.) https://id.oclc.org/worldcat/entity/E39PCjvP4fHBGr9PGGphxpwxKq http://id.loc.gov/authorities/names/nb2011026778 Protecting industrial control systems from electronic threats / Joseph Weiss. 1st ed. New York : Momentum Press, ©2010. 1 online resource (ix, 327 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. "Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and "SCADA security" (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs), and all the other, field controllers, sensors, drives, and emission controls that make up the "intelligence" of modern industrial buildings and facilities"--Resource description page. Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations. Print version record. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer networks / Security measures. blmlsh Computer networks Security measures fast Industrial Control Systems SCADA Process Controls Cyber Security Critical Infrastructure Protection Smart Grid has work: Protecting industrial control systems from electronic threats (Text) https://id.oclc.org/worldcat/entity/E39PCGDfQkxr7tmvghDhrFrhh3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Weiss, Joseph. Protecting industrial control systems from electronic threats. New York : Momentum Press, 2010 9781606501979 (OCoLC)646810789 |
spellingShingle | Weiss, Joseph (Joseph M.) Protecting industrial control systems from electronic threats / Acknowledgments -- Preface -- 1. Background -- 2. Definitions -- 3. Industrial control system descriptions -- 4. Convergence of industrial control systems and information technology -- 5. Differences between industrial control systems and information technology -- 6. Electronic threats to industrial control systems -- 7. Myths -- 8. Current personnel status and needs -- 9. Information sharing and disclosure -- 10. Industrial control system cyber risk assessments -- 11. Selected industry activities -- 12. industrial control system security trends and observations -- 13. industrial control system cyber security demonstrations -- 14. Selected case histories: malicious attacks -- 15. Selected case histories: unintentional incidents -- 16. Industrial control system incident categorization -- 17. Recommendations. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer networks / Security measures. blmlsh Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Protecting industrial control systems from electronic threats / |
title_auth | Protecting industrial control systems from electronic threats / |
title_exact_search | Protecting industrial control systems from electronic threats / |
title_full | Protecting industrial control systems from electronic threats / Joseph Weiss. |
title_fullStr | Protecting industrial control systems from electronic threats / Joseph Weiss. |
title_full_unstemmed | Protecting industrial control systems from electronic threats / Joseph Weiss. |
title_short | Protecting industrial control systems from electronic threats / |
title_sort | protecting industrial control systems from electronic threats |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. BUSINESS & ECONOMICS Industrial Management. bisacsh BUSINESS & ECONOMICS Management. bisacsh BUSINESS & ECONOMICS Management Science. bisacsh BUSINESS & ECONOMICS Organizational Behavior. bisacsh Computer networks / Security measures. blmlsh Computer networks Security measures fast |
topic_facet | Computer networks Security measures. Réseaux d'ordinateurs Sécurité Mesures. BUSINESS & ECONOMICS Industrial Management. BUSINESS & ECONOMICS Management. BUSINESS & ECONOMICS Management Science. BUSINESS & ECONOMICS Organizational Behavior. Computer networks / Security measures. Computer networks Security measures |
work_keys_str_mv | AT weissjoseph protectingindustrialcontrolsystemsfromelectronicthreats |