LEADER 03473nam 2200613 a 450 001 9910463232803321 005 20200520144314.0 010 $a1-299-40881-8 010 $a0-12-404638-X 035 $a(CKB)2670000000338802 035 $a(EBL)1115187 035 $a(OCoLC)830170155 035 $a(SSID)ssj0000830894 035 $a(PQKBManifestationID)11440037 035 $a(PQKBTitleCode)TC0000830894 035 $a(PQKBWorkID)10873065 035 $a(PQKB)10700652 035 $a(MiAaPQ)EBC1115187 035 $a(CaSebORM)9781597499989 035 $a(Au-PeEL)EBL1115187 035 $a(CaPaEBR)ebr10685458 035 $a(CaONFJC)MIL472131 035 $a(EXLCZ)992670000000338802 100 $a20130222d2013 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aApplied cyber security and the smart grid$b[electronic resource] $eimplementing security controls into the modern power infrastructure /$fEric D. Knapp, Raj Samani ; Joel Langill, technical editor 205 $a1st edition 210 $aAmsterdam ;$aBoston $cElsevier/Syngress$d2013 215 $a1 online resource (225 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-998-6 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary. 330 $a"Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system of the "Smart Grid," which utilize both common and open protocols as well as many highly specialized protocols used for industrial automation and control, most of which are designed for efficiency and reliability to support the economic and operational requirements of large distributed control systems. Similarly, industrial protocols are designed for real-time operation requiring deterministic results with continuous availability. Combined together, this blend of open and proprietary networks enables the much larger network of measurements, controls, metering and automation that is the Smart Grid. This amalgam of disparate systems and networks is also a major factor in the cyber security concerns facing the Smart Grid today"--$cProvided by publisher. 606 $aSmart power grids$xSecurity measures 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aSmart power grids$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a621.310285/58 700 $aKnapp$b Eric D$0861975 701 $aSamani$b Raj$0861976 701 $aLangill$b Joel$0861977 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463232803321 996 $aApplied cyber security and the smart grid$91924004 997 $aUNINA