advertisement
Handbook of SCADA/Control Systems Security
Book description
The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.
advertisement
Digital Communication: Fundamentals and Application
Table of contents
Chapter 1 - Introduction (1/3)
Chapter 1 - Introduction (2/3)
Chapter 1 - Introduction (3/3)
Chapter 2 - Sociological and Cultural Aspects (1/3)
Chapter 2 - Sociological and Cultural Aspects (2/3)
Chapter 2 - Sociological and Cultural Aspects (3/3)
Chapter 3 - Threat Vectors (1/3)
Chapter 3 - Threat Vectors (2/3)
Chapter 3 - Threat Vectors (3/3)
Chapter 4 - Risk Management (1/10)
Chapter 4 - Risk Management (2/10)
Chapter 4 - Risk Management (3/10)
Chapter 4 - Risk Management (4/10)
Chapter 4 - Risk Management (5/10)
Chapter 4 - Risk Management (6/10)
Chapter 4 - Risk Management (7/10)
Chapter 4 - Risk Management (8/10)
Chapter 4 - Risk Management (9/10)
Chapter 4 - Risk Management (10/10)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (1/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (2/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (3/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (4/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (5/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (6/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (7/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (8/9)
Chapter 5 - Disaster Recovery and Business Continuity of SCADA (9/9)
Chapter 6 - Incident Response and SCADA (1/3)
Chapter 6 - Incident Response and SCADA (2/3)
Chapter 6 - Incident Response and SCADA (3/3)
Chapter 7 - Forensics Management (1/7)
Chapter 7 - Forensics Management (2/7)
Chapter 7 - Forensics Management (3/7)
Chapter 7 - Forensics Management (4/7)
Chapter 7 - Forensics Management (5/7)
Chapter 7 - Forensics Management (6/7)
Chapter 7 - Forensics Management (7/7)
Chapter 8 - Governance and Compliance (1/6)
Chapter 8 - Governance and Compliance (2/6)
Chapter 8 - Governance and Compliance (3/6)
Chapter 8 - Governance and Compliance (4/6)
Chapter 8 - Governance and Compliance (5/6)
Chapter 8 - Governance and Compliance (6/6)
Chapter 9 - Communications and Engineering Systems (1/2)
Chapter 9 - Communications and Engineering Systems (2/2)
Chapter 10 - Metrics Framework for a SCADA System (1/2)
Chapter 10 - Metrics Framework for a SCADA System (2/2)
Chapter 11 - Network Topology and Implementation (1/4)
Chapter 11 - Network Topology and Implementation (2/4)
Chapter 11 - Network Topology and Implementation (3/4)
Chapter 11 - Network Topology and Implementation (4/4)
Chapter 12 - Obsolescence and Procurement of SCADA (1/2)
Chapter 12 - Obsolescence and Procurement of SCADA (2/2)
Chapter 13 - Patching and Change Management (1/2)
Chapter 13 - Patching and Change Management (2/2)
Chapter 14 - Physical Security Management (1/5)
Chapter 14 - Physical Security Management (2/5)
Chapter 14 - Physical Security Management (3/5)
Chapter 14 - Physical Security Management (4/5)
Chapter 14 - Physical Security Management (5/5)
Chapter 15 - Tabletop/Red– Blue Exercises (1/3)
Chapter 15 - Tabletop/Red– Blue Exercises (2/3)
Chapter 15 - Tabletop/Red– Blue Exercises (3/3)
Chapter 16 - Integrity Monitoring (1/4)
Chapter 16 - Integrity Monitoring (2/4)
Chapter 16 - Integrity Monitoring (3/4)
Chapter 16 - Integrity Monitoring (4/4)
Chapter 17 - Data Management and Records Retention (1/3)
Chapter 17 - Data Management and Records Retention (2/3)
Chapter 17 - Data Management and Records Retention (3/3)
Chapter 18 - The Future of SCADA and Control Systems Security
Appendix A: Listing of Online Resources SCADA/Control Systems (1/3)
Appendix A: Listing of Online Resources SCADA/Control Systems (2/3)
Appendix A: Listing of Online Resources SCADA/Control Systems (3/3)
Appendix B: Terms and Definitions
Back Cover
Download full PDF in Comment section
advertisement
Handbook of SCADA/Control Systems Security
ReplyDeleteinterested
Deleteinterested
ReplyDeleteInterested
ReplyDeletewanna be informed
ReplyDeleteEstoy interesado
ReplyDeleteZainteresowany I am interested in
ReplyDeleteI am interested in
ReplyDeleteintrested
ReplyDeleteyes interested
ReplyDeleteDownload interested
ReplyDelete