00912nam0-2200313---450-99000928215040332120101118150224.088-299-0998-X000928215FED01000928215(Aleph)000928215FED0100092821520101118d1991----km-y0itay50------baitaengITa-------001yy<<L'>>assistenza al malato con problemi neurologicitraduzione italiana a cura di Enrico PierangeliPadovaPiccin1991160 p.ill.27 cmPhotobook2001Coping with neurologic disorders59880InfermieristicaManualiITUNINARICAUNIMARCBK99000928215040332190 T 2b 63FMEBCFMEBCCoping with neurologic disorders59880UNINA03473nam 2200613 a 450 991046323280332120200520144314.01-299-40881-80-12-404638-X(CKB)2670000000338802(EBL)1115187(OCoLC)830170155(SSID)ssj0000830894(PQKBManifestationID)11440037(PQKBTitleCode)TC0000830894(PQKBWorkID)10873065(PQKB)10700652(MiAaPQ)EBC1115187(CaSebORM)9781597499989(Au-PeEL)EBL1115187(CaPaEBR)ebr10685458(CaONFJC)MIL472131(EXLCZ)99267000000033880220130222d2013 uy 0engurunu|||||txtccrApplied cyber security and the smart grid[electronic resource] implementing security controls into the modern power infrastructure /Eric D. Knapp, Raj Samani ; Joel Langill, technical editor1st editionAmsterdam ;Boston Elsevier/Syngress20131 online resource (225 p.)Description based upon print version of record.1-59749-998-6 Includes bibliographical references and index.Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary."Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"--Provided by publisher.Smart power gridsSecurity measuresComputer networksSecurity measuresElectronic books.Smart power gridsSecurity measures.Computer networksSecurity measures.621.310285/58Knapp Eric D861975Samani Raj861976Langill Joel861977MiAaPQMiAaPQMiAaPQBOOK9910463232803321Applied cyber security and the smart grid1924004UNINA