Techno security's guide to securing SCADA:
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the m...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, Mass. Oxford
Syngress ;
2007
Rockland, Mass. Oxford Elsevier Science [distributor] 2007 |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492829/?ar |
Zusammenfassung: | Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field |
Beschreibung: | "A comprehensive handbook on protecting the critical infrastructure"--Cover. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxiv, 325 Seiten) illustrations |
ISBN: | 9781597492829 1597492825 9780080569994 0080569994 1281762962 9781281762962 9786611762964 6611762965 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647647 | ||
003 | DE-627-1 | ||
005 | 20240228114315.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9781597492829 |9 978-1-59749-282-9 | ||
020 | |a 1597492825 |9 1-59749-282-5 | ||
020 | |a 9780080569994 |c electronic bk. |9 978-0-08-056999-4 | ||
020 | |a 0080569994 |c electronic bk. |9 0-08-056999-4 | ||
020 | |a 1281762962 |9 1-281-76296-2 | ||
020 | |a 9781281762962 |9 978-1-281-76296-2 | ||
020 | |a 9786611762964 |9 9786611762964 | ||
020 | |a 6611762965 |9 6611762965 | ||
035 | |a (DE-627-1)047647647 | ||
035 | |a (DE-599)KEP047647647 | ||
035 | |a (ORHE)9781597492829 | ||
035 | |a (DE-627-1)047647647 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 0 | |a 620.46028558 |2 22 | |
100 | 1 | |a Wiles, Jack |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Techno security's guide to securing SCADA |c Jack Wiles [and others] ; foreword by Amit Yoran |
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress ; |c 2007 | |
264 | 1 | |a Rockland, Mass. |a Oxford |b Elsevier Science [distributor] |c 2007 | |
300 | |a 1 Online-Ressource (xxiv, 325 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a "A comprehensive handbook on protecting the critical infrastructure"--Cover. - Includes bibliographical references and index. - Print version record | ||
520 | |a Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field | ||
546 | |a English. | ||
650 | 0 | |a Supervisory control systems |x Security measures | |
650 | 0 | |a Automatic data collection systems |x Security measures | |
650 | 0 | |a Infrastructure (Economics) |x Security measures | |
650 | 4 | |a Commande supervisée ; Sécurité ; Mesures | |
650 | 4 | |a Collecte automatique des données ; Sécurité ; Mesures | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Automation | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Robotics | |
650 | 4 | |a Supervisory control systems ; Security measures | |
650 | 4 | |a Automatic data collection systems ; Security measures | |
650 | 4 | |a Infrastructure (Economics) ; Security measures | |
650 | 4 | |a Infrastructure (Economics) ; Security measures | |
776 | 1 | |z 9781597492829 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492829 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492829/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647647 |
---|---|
_version_ | 1821494867510951936 |
adam_text | |
any_adam_object | |
author | Wiles, Jack |
author_facet | Wiles, Jack |
author_role | aut |
author_sort | Wiles, Jack |
author_variant | j w jw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647647 (DE-599)KEP047647647 (ORHE)9781597492829 |
dewey-full | 620.46028558 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 620 - Engineering and allied operations |
dewey-raw | 620.46028558 |
dewey-search | 620.46028558 |
dewey-sort | 3620.46028558 |
dewey-tens | 620 - Engineering and allied operations |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04713cam a22006372 4500</leader><controlfield tag="001">ZDB-30-ORH-047647647</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114315.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492829</subfield><subfield code="9">978-1-59749-282-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492825</subfield><subfield code="9">1-59749-282-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080569994</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-056999-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080569994</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-056999-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281762962</subfield><subfield code="9">1-281-76296-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281762962</subfield><subfield code="9">978-1-281-76296-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611762964</subfield><subfield code="9">9786611762964</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611762965</subfield><subfield code="9">6611762965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492829</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647647</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">620.46028558</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Techno security's guide to securing SCADA</subfield><subfield code="c">Jack Wiles [and others] ; foreword by Amit Yoran</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress ;</subfield><subfield code="c">2007</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 325 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A comprehensive handbook on protecting the critical infrastructure"--Cover. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Supervisory control systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Automatic data collection systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commande supervisée ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Collecte automatique des données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Automation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Robotics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Supervisory control systems ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automatic data collection systems ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics) ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics) ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597492829</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492829</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492829/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647647 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597492829 1597492825 9780080569994 0080569994 1281762962 9781281762962 9786611762964 6611762965 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxiv, 325 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress ; Elsevier Science [distributor] |
record_format | marc |
spelling | Wiles, Jack VerfasserIn aut Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran Rockland, Mass. Oxford Syngress ; 2007 Rockland, Mass. Oxford Elsevier Science [distributor] 2007 1 Online-Ressource (xxiv, 325 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier "A comprehensive handbook on protecting the critical infrastructure"--Cover. - Includes bibliographical references and index. - Print version record Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field English. Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures Commande supervisée ; Sécurité ; Mesures Collecte automatique des données ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Automation TECHNOLOGY & ENGINEERING ; Robotics Supervisory control systems ; Security measures Automatic data collection systems ; Security measures Infrastructure (Economics) ; Security measures 9781597492829 Erscheint auch als Druck-Ausgabe 9781597492829 |
spellingShingle | Wiles, Jack Techno security's guide to securing SCADA Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures Commande supervisée ; Sécurité ; Mesures Collecte automatique des données ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Automation TECHNOLOGY & ENGINEERING ; Robotics Supervisory control systems ; Security measures Automatic data collection systems ; Security measures Infrastructure (Economics) ; Security measures |
title | Techno security's guide to securing SCADA |
title_auth | Techno security's guide to securing SCADA |
title_exact_search | Techno security's guide to securing SCADA |
title_full | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_fullStr | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_full_unstemmed | Techno security's guide to securing SCADA Jack Wiles [and others] ; foreword by Amit Yoran |
title_short | Techno security's guide to securing SCADA |
title_sort | techno security s guide to securing scada |
topic | Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures Commande supervisée ; Sécurité ; Mesures Collecte automatique des données ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Automation TECHNOLOGY & ENGINEERING ; Robotics Supervisory control systems ; Security measures Automatic data collection systems ; Security measures Infrastructure (Economics) ; Security measures |
topic_facet | Supervisory control systems Security measures Automatic data collection systems Security measures Infrastructure (Economics) Security measures Commande supervisée ; Sécurité ; Mesures Collecte automatique des données ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Automation TECHNOLOGY & ENGINEERING ; Robotics Supervisory control systems ; Security measures Automatic data collection systems ; Security measures Infrastructure (Economics) ; Security measures |
work_keys_str_mv | AT wilesjack technosecuritysguidetosecuringscada |