Cyber-security of SCADA and Other Industrial Control Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber-security of SCADA and Other Industrial Control Systems by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319321257
Publisher: Springer International Publishing Publication: August 23, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319321257
Publisher: Springer International Publishing
Publication: August 23, 2016
Imprint: Springer
Language: English

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?

This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

More books from Springer International Publishing

Cover of the book Ultra-Short Pulsed Laser Engineered Metal-Glass Nanocomposites by
Cover of the book Architecture, Urban Space and War by
Cover of the book Cyber Weaponry by
Cover of the book Hiding Data - Selected Topics by
Cover of the book Information and Interaction by
Cover of the book Enterprise, Business-Process and Information Systems Modeling by
Cover of the book The Function of Emotions by
Cover of the book The Unaccountable State of Surveillance by
Cover of the book Insects, Fire and Conservation by
Cover of the book The Creation of the Human Development Approach by
Cover of the book Meaning and Controversy within Chinese Ancestor Religion by
Cover of the book Critical Space Infrastructures by
Cover of the book Poverty in the United States by
Cover of the book The Political Economy of Change and Continuity in Korea by
Cover of the book Advances in Neural Networks - ISNN 2017 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy