MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Handbook Of Scada control Systems Security Second Edition



This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems enviro... more details

R3 871.00 from Loot.co.za

price history Price history

   BP = Best Price   HP = Highest Price

Current Price: R3 871.00

loading...

tagged products icon   Similarly Tagged Products

Features
Format hardcover
ISBN 9781498717076
Pages 392
Description
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in
  • Social implications and impacts
  • Governance and management
  • Architecture and modeling
  • Commissioning and operations
  • The future of SCADA and control systems security
The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.