02830oam 2200697I 450 991045788320332120200520144314.00-429-16380-01-4665-1610-01-283-59637-797866139088271-4398-0198-310.1201/b11352 (CKB)2550000000074891(EBL)826923(OCoLC)804664118(SSID)ssj0000551152(PQKBManifestationID)11348279(PQKBTitleCode)TC0000551152(PQKBWorkID)10524960(PQKB)11027498(MiAaPQ)EBC826923(CaSebORM)9781439801987(Au-PeEL)EBL826923(CaPaEBR)ebr10518005(CaONFJC)MIL390882(OCoLC)809742633(OCoLC)773301548(EXLCZ)99255000000007489120180331d2012 uy 0engur|n|---|||||txtccrCybersecurity for industrial control systems SCADA, DCS, PLC, HMI, and SIS /Tyson Macaulay and Bryan Singer1st editionBoca Raton :CRC Press,2012.1 online resource (330 p.)An Auerbach book.1-4398-0196-7 Includes bibliographical references.Cover; Title Page; Copyright; Contents; AUTHORS; CHAPTER 1: INTRODUCTION; CHAPTER 2: THREATS TO ICS; CHAPTER 3: ICS VULNERABILITIES; CHAPTER 4: RISK ASSESSMENT TECHNIQUES; CHAPTER 5: WHAT IS NEXT IN ICS SECURITY?; INDEXAs industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiencProcess controlSecurity measuresAutomatic machinerySecurity measuresComputer securityElectronic books.Process controlSecurity measures.Automatic machinerySecurity measures.Computer security.658.4/78Macaulay Tyson.888956Singer Bryan1042959MiAaPQMiAaPQMiAaPQBOOK9910457883203321Cybersecurity for industrial control systems2467606UNINA