• Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Robust Control System Net... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par Howbook
État: D'occasion: Très bon
Commentaire: A good clean copy throughout..
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Robust Control System Networks: How to Achieve Reliable Control After Stuxnet (Anglais) Relié – 28 septembre 2011

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 95,73
EUR 65,62 EUR 41,49
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

  • Outlet Anciennes collections, fin de séries, articles commandés en trop grande quantité, … découvrez notre sélection de produits à petits prix Profitez-en !

  • Rentrée scolaire : trouvez tous vos livres, cartables, cahiers, chaussures, et bien plus encore... dans notre boutique dédiée

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.4 étoiles sur 5 7 commentaires
7 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 1st 5-Star SCADA Security Book - Perfect for ICS Engineer 12 septembre 2011
Par Dale Peterson - Publié sur Amazon.com
Format: Relié
It would have been easy for Ralph Langner to write a first hand book on the twists and turns of the Stuxnet story. Instead, he goes in a completely different direction by writing essentially an engineering practices book, Robust Control System Networks. And it is one heck of a second act to Stuxnet.

This is the first great, 5-star ICS security book ... and Ralph will probably protest that it is not an ICS security book. It is the book you should give to ICS engineers who have been pushing back on cyber security. It is the book you should give to ICS security professionals who need to know how to intellectually reach an ICS engineer. I think an honest engineer reading this book will be embarrassed at the realization of how he has allowed fragility in the form of `cyber' to live in his SCADA or DCS.

Importantly it is not a book to learn what SCADA and DCS are, how firewalls, IDS/IPS, and other technical security controls should be applied to ICS, or how to perform an ICS security assessment.

ICS security professionals have been preaching security and cajoling owner/operators to implement security controls for a decade now with very limited success. In this book, Mr. Langner takes a different approach. He talks about inputs and outputs to a process, controlling variances and other techniques that ICS engineers use all the time. But he applies it to the cyber / information realm making the argument that the ICS community has allowed these applications, systems and networks to be built with a fragility that would not be accepted in the physical systems they design.

Langner argues a robust system should both limit and be able to handle variances, while a fragile system may not work properly with a variance from expected inputs. It is a new language where terms like confidentiality-integrity-availability, least privilege, authorization ... are replaced with variance, fragility, robustness and resilience. The idea of a security risk assessment is addressed and dismissed quickly because risk and security, particularly related to threat, are hypothetical while fragility and robustness can be proven for certain inputs.

Chapter 2: The Problem of Cyber Fragility in IACS and Chapter 3: Cyber Robustness are the must reads. I think it will change the lexicon of, and approach to, ICS security for many practitioners.

Mr. Langner spends portions of multiple chapters on documentation, both on the specifications and the actual system model. When you consider the disparity between the physical engineering diagrams and the logical interface diagrams it is not surprising that variances cause problems because often times owner/operators (and even the vendors) don't know the details of logical interface. The documentation may be the hardest sell from the book, but again you can ask the owner/operators if they would deploy and operate a system with a similar lack of physical system understanding and documentation.

The book is very well written and edited. It flows logically and pulls you along a path. The tone and approach is consistent, but there are enough war stories (consistently in italics) to keep it interesting and emphasize the concepts are not just theories.

Those new to ICS should make sure to read the Appendices. They contain story after story about how variances in applications, systems and networks have had negative affects on ICS. The difference is it is not written with the common defensive reflex "ICS are different". It was my least favorite part of the book, but I'm sure many new the field will enjoy it.

Nits To Pick

There is not much to criticize about this book, but here are two very minor points:

1. The book is written for engineers, but I found myself thinking a few times that a certain engineering effort was almost identical to an Information Security (IS) practice. For example the UML diagrams for the cyber process system model in Chapter 4 seemed almost identical to threat modeling. It likely would have ruined the flow of the book to try to include this comparison in each chapter, but the second edition could benefit from an appendix mapping engineering practice to the IS practice.

2. Creating and frequently using the words robustifying and robustification. This really is just a writer's complaint. It is intuitive what they mean, but I hope they don't become common usage in ICS security.
5.0 étoiles sur 5 Practical Steps With Appropriate Level of Engineering Rigor 13 juin 2014
Par Michael D. Carr, P.E. - Publié sur Amazon.com
Format: Relié Achat vérifié
Removes ICS security ambiguity and replaces with sensible framework for Robustification of systems and processes. Not much left to the imagination with these recommendations! Concepts developed and vetted by complex real-world scenarios. Essentially, a must "read and heed" manual for successful process control in today's environment.
5.0 étoiles sur 5 A FUD-free approach to security 13 septembre 2014
Par Austin M Scott - Publié sur Amazon.com
Format: Relié Achat vérifié
Other than the mention of "$tuxnet" in the title, Ralph Langner takes a fear tactic free approach to ICS / PCD security. Strong focus on creating solutions that will stand up to the ever changing industrial networking environment,
The first 5 star control system cyber security book I have read.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Creative, Inspiring 25 juillet 2013
Par Thomas Rid - Publié sur Amazon.com
Format: Relié
A brilliant book.

There is not much to add to Dale Peterson's and Richard Bejtlich's really helpful reviews. Except to highlight Ralph Langner's annex: the book is not just useful and inspriring for asset owners and ICS engineers, but also for scholars working on cyber security. Langner, rather unexpectedly, teases out fascinating conceptual differences between IT security and process security. He does so by bringing in core ideas from control theory. I know this may sound dry to some, but it is actually fascinating.
1 internautes sur 2 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Topical but Dry! 5 mars 2013
Par Jeffrey A Monforton - Publié sur Amazon.com
Format: Relié Achat vérifié
The material was what I was looking for but the delivery is dry as dust!

The ideas presented are well thought out and definitely gives the ability to justify application of the concepts. When considering this think more of reading a PhD thesis than a narrative. The approach is methodical and the examples add to the understanding of the concepts.

If you are looking for a book on Communications Networking in the Automation world then this is not the book that you are looking for.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?