Free Downloads
Cyber-security Of SCADA And Other Industrial Control Systems (Advances In Information Security)

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Series: Advances in Information Security (Book 66)

Hardcover: 355 pages

Publisher: Springer; 1st ed. 2016 edition (August 24, 2016)

Language: English

ISBN-10: 3319321234

ISBN-13: 978-3319321233

Product Dimensions: 6.1 x 0.9 x 9.2 inches

Shipping Weight: 1.6 pounds (View shipping rates and policies)

Average Customer Review: Be the first to review this item

Best Sellers Rank: #1,459,935 in Books (See Top 100 in Books) #93 in Books > Computers & Technology > Hardware & DIY > Microprocessors & System Design > Control Systems #295 in Books > Computers & Technology > Hardware & DIY > Internet & Networking #1192 in Books > Computers & Technology > Networking & Cloud Computing > Network Security

Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Hacking SCADA/Industrial Control Systems: The Pentest Guide Wind Turbine Control Systems: Principles, Modelling and Gain Scheduling Design (Advances in Industrial Control) Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare Model Predictive Control System Design and Implementation Using MATLAB® (Advances in Industrial Control) An Approach to Vulnerability Assessment for Navy Supervisory Control and Data Acquisition (SCADA) Systems An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems Evaluation of Industrial Disability: Prepared by the Committee of the California Medical Association and Industrial Accident Commission of the State ... of Joint Measures in Industrial Injury Cases. Communications for Control in Cyber Physical Systems: Theory, Design and Applications in Smart Grids ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management (Redesignation of ISO/IEC 17799:2005) Design Research in Information Systems: Theory and Practice: 22 (Integrated Series in Information Systems) Access Control, Authentication, And Public Key Infrastructure (Jones & Bartlett Learning Information Systems Security) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance)