Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Prix Kindle : EUR 65,50

Économisez
EUR 26,92 (29%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Repliez vers l'arrière Repliez vers l'avant
Narration Audible Lecture en cours... Interrompu   Vous écoutez un extrait de la narration Audible pour ce livre Kindle.
En savoir plus

Handbook of SCADA/Control Systems Security [Print Replica] Format Kindle


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 65,50

Ponts de mai 2016 Promo Ponts de mai 2016


Descriptions du produit

Présentation de l'éditeur

The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.



Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:





  • Emerging trends and threat factors that plague the ICS security community

  • Risk methodologies and principles that can be applied to safeguard and secure an automated operation

  • Methods for determining events leading to a cyber incident, and methods for restoring and mitigating issues—including the importance of critical communications

  • The necessity and reasoning behind implementing a governance or compliance program

  • A strategic roadmap for the development of a secured SCADA/control systems environment, with examples

  • Relevant issues concerning the maintenance, patching, and physical localities of ICS equipment

  • How to conduct training exercises for SCADA/control systems



The final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security.



The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a "best practices" approach to securing business management environments at the strategic, tactical, and operational levels.


Biographie de l'auteur

Robert Radvanovsky is an active professional in the United States with knowledge in security, risk management, business continuity, disaster recovery planning, and remediation. He has significantly contributed to establishing several certification programs, specifically on the topics of "critical infrastructure protection" and "critical infrastructure assurance." He has published a number of articles and white papers regarding this topic. Significantly involved in establishing security training and awareness programs through his company, his extracurricular activities also include working several professional accreditation and educational institutions, specifically on the topics of homeland security, critical infrastructure protection and assurance, and cyber security.

Jacob Brodsky has worked on every aspect of SCADA and control systems for Washington Suburban Sanitary Commission (WSSC)—from the assembly language firmware of the RTU, to the communications protocols, the telecommunications networks, the data networks, systems programming, protocol drivers, HMI design, and PLC programming. In 2012, he was elected chairman of the DNP User group. Jake has contributed to the NIST SP 800-82 effort and to the ISA-99 effort. He is a registered professional engineer of control systems in the state of Maryland.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 6626 KB
  • Nombre de pages de l'édition imprimée : 383 pages
  • Editeur : CRC Press (19 avril 2016)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00CM22NA4
  • Synthèse vocale : Non activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°394.439 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x91aa01f8) étoiles sur 5 3 commentaires
HASH(0x918dc60c) étoiles sur 5 For anyone who wants to truly grasp SCADA security issues 26 février 2014
Par Rita Mix - Publié sur Amazon.com
Format: Relié Achat vérifié
I cannot imagine a better book, whether you're a "newbie" or a seasoned SCADA engineer. Very thorough, very interesting, and very well written!
HASH(0x9176c54c) étoiles sur 5 Awesome Book for the Cyber Security Student 14 juin 2014
Par Sherri Snyder - Publié sur Amazon.com
Format: Relié
I am a student in a Cybersecurity Master's degree program and I have referred to this book in every class. Very helpful and insightful!
0 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x9176c8dc) étoiles sur 5 Great book by 2 industry experts 26 septembre 2013
Par D. R. Pitzer - Publié sur Amazon.com
Format: Relié Achat vérifié
These authors are industry experts, so you'd expect a book by them to be good. It is. This is not a theoretical treatment of the subject ... sound practical advice.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Discussions entre clients