𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Industrial Network Security, 2nd Edition

✍ Scribed by Teumim, David J


Publisher
International Society of Automation;ISA
Year
2010
Tongue
English
Leaves
95
Edition
2nd ed
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.

Whether we talk about process control systems that run chemical plants and refineries, supervisory control and data acquisition (SCADA) systems for utilities, or factory automation systems for discrete manufacturing, the backbone of our nation’s critical infrastructure consists of these industrial networks and is dependent on their continued operation.

This easy-to-read book introduces managers, engineers, technicians, and operators on how to keep our industrial networks secure amid rising threats from hackers, disgruntled employees, and even cyberterrorists

✦ Table of Contents


Content: Industrial network security --
A security backgrounder --
COTS and connectivity --
Cybersecurity in a nutshell --
Countermeasures --
Cyberdefense part I : defense and planning --
Cyberdefense part II : technology --
Cyberdefense part III : people, policies, and security assurance --
New topics in industrial network security --
Defending industrial networks : case histories.

✦ Subjects


Computer networks -- Security measures.;Computer security.


πŸ“œ SIMILAR VOLUMES


Network Security Essentials (2nd Edition
✍ William Stallings πŸ“‚ Library πŸ“… 2002 🌐 English

This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of crypto

Managing Cisco Network Security 2nd edit
✍ Sean Thurston πŸ“‚ Library 🌐 English

In addition to providing a general understanding of IP network security and the threat environment, this book offers detailed and practical information on how to use Cisco’s suite of security products. Callisma’s contributing authors are industry experts with real world implementation experience. Ea

Mastering Python for Networking and Secu
✍ JosΓ© Manuel Ortega πŸ“‚ Library πŸ“… 2021 πŸ› Packt Publishing 🌐 English

<div> <p>Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapy</p> <h3>Key Features</h3> <ul><li>Enhance your Python programming skills in securing systems and executing networking tasks</li> <li>Explore Python scripts to debug and secure complex

Industrial Network Security, Second Edit
✍ Teumim, David J πŸ“‚ Library πŸ“… 2010 πŸ› International Society of Automation;ISA 🌐 English

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr

Industrial Network Security, Second Edit
✍ Teumim, David J πŸ“‚ Library πŸ“… 2010 πŸ› International Society of Automation;ISA 🌐 English

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.<P>Whether we talk about pr

Network Security: Private Communication
✍ Charlie Kaufman, Radia Perlman, Mike Speciner πŸ“‚ Library πŸ“… 2002 πŸ› Prentice Hall 🌐 English

The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advan