Securing critical infrastructures and critical control systems : approaches for threat protection
Saved in:
| Other Authors | , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hershey, PA :
Information Science Reference IGI,
©2013.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781466626904 1466626909 9781621989677 1621989674 9781466627215 1466627212 1466626593 9781466626591 9781299394742 1299394744 |
| Physical Description | 1 online resource (xix, 430 pages) : illustrations, maps |
Cover
| LEADER | 00000cam a2200000Ma 4500 | ||
|---|---|---|---|
| 001 | kn-ocn852195553 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 120829s2013 pauab ob 001 0 eng d | ||
| 040 | |a CDX |b eng |e pn |c CDX |d OCLCQ |d E7B |d KNOVL |d OCLCQ |d UMI |d OCLCQ |d YDXCP |d N$T |d OCLCQ |d OCLCF |d OCLCO |d COO |d ZCU |d KNOVL |d IDEBK |d OCLCO |d OCLCQ |d OCLCO |d EBLCP |d OCLCO |d OCLCQ |d STF |d VT2 |d OCLCO |d OCLCQ |d OCLCA |d CEF |d RRP |d OCLCQ |d AU@ |d OCLCO |d OCLCA |d WYU |d OL$ |d HS0 |d OCLCQ |d UKBTH |d OCLCQ |d OCLCO |d DST |d OCLCO |d OCLCQ |d OCLCO |d SXB | ||
| 020 | |a 9781466626904 |q (electronic bk.) | ||
| 020 | |a 1466626909 |q (electronic bk.) | ||
| 020 | |a 9781621989677 |q (electronic bk.) | ||
| 020 | |a 1621989674 |q (electronic bk.) | ||
| 020 | |a 9781466627215 |q (print & perpetual access) | ||
| 020 | |a 1466627212 |q (print & perpetual access) | ||
| 020 | |z 1466626593 | ||
| 020 | |z 9781466626591 | ||
| 020 | |z 9781299394742 | ||
| 020 | |z 1299394744 | ||
| 035 | |a (OCoLC)852195553 |z (OCoLC)842852426 |z (OCoLC)858949462 |z (OCoLC)923162481 |z (OCoLC)961886472 |z (OCoLC)988655688 |z (OCoLC)999545677 |z (OCoLC)1002896044 |z (OCoLC)1005747999 |z (OCoLC)1065966188 |z (OCoLC)1109019759 |z (OCoLC)1112974478 |z (OCoLC)1136360212 |z (OCoLC)1159654950 |z (OCoLC)1250576741 |z (OCoLC)1300602622 |z (OCoLC)1303358839 | ||
| 245 | 0 | 0 | |a Securing critical infrastructures and critical control systems : |b approaches for threat protection / |c Christopher Laing, Atta Badii, Paul Vickers, [editors]. |
| 260 | |a Hershey, PA : |b Information Science Reference IGI, |c ©2013. | ||
| 300 | |a 1 online resource (xix, 430 pages) : |b illustrations, maps | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 500 | |a "Premier reference source"--Cover. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a ""Title Page""; ""Copyright Page""; ""Editorial Advisory Board and List of Reviewers""; ""Table of Contents""; ""Detailed Table of Contents""; ""Preface""; ""Acknowledgment""; ""Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities""; ""Detecting Cyber Attacks on SCADA and Other Critical Infrastructures""; ""Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology""; ""Industrial Control Systems: The Human Threat""; ""ENISA Study: Challenges in Securing Industrial Control Systems"" | |
| 505 | 8 | |a ""Distributed Monitoring: A Framework for Securing Data Acquisition""""Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats""; ""Patching our Critical Infrastructure: Towards an Efficient Patch and Update Management for Industrial Control Systems""; ""ICS Software Protection""; ""A Community-Oriented Approach to CIIP in Developing Countries""; ""Designing a Security Audit Plan for a Critical Information Infrastructure (CII)""; ""Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management"" | |
| 505 | 8 | |a ""Fortifying Large Scale, Geospatial Networks: Implications for Supervisory Control and Data Acquisition Systems""""Information Sharing for CIP: Between Policy, Theory, and Practice""; ""Intrusion Detection and Resilient Control for SCADA Systems""; ""Compilation of References""; ""About the Contributors""; ""Index"" | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Buildings |x Security measures. | |
| 650 | 0 | |a Intelligent buildings. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Laing, Christopher. | |
| 700 | 1 | |a Badii, Atta. | |
| 700 | 1 | |a Vickers, Paul, |d 1966- | |
| 776 | 0 | 8 | |i Print version: |z 9781299394742 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpSCICCSA1/securing-critical-infrastructures?kpromoter=marc |y Full text |