I had high hopes for this book since Bryan Singer is very experienced in ICS, ICS security, and IT security — and Bryan and co-author Tyson McCauley did not disappoint. To date this is clearly the best book on ICS Security by far. The two best things about this book are: 1) They got the facts right about both ICS and IT security. This is not as easy as it sounds as most books have failed or been simplistic in one area or another. 2) They provided the background information for a beginner to understand, but followed that up with significant technical detail and examples. It’s a good book for a beginner or intermediate in either area, and even those with years of experience in both areas will learn something. For me the best new info was the Overall Equipment Effectiveness (OEE) and Security OEE as a future risk assessment technique in Chapter 4. … I could go on and on as I highlighted sentences throughout the chapter and was muttering yes as I read. … This is clearly the book to get or give if you want to read about ICS security today.
—Dale G Peterson, writing on www.digitalbond.com
(For the full review, visit: http://www.digitalbond.com/2012/03/27/4-star-review-for-mccauleysinger-book-cybersecurity-for-ics/#more-11213)
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.
Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Estado de conservación: New. Nº de ref. de la librería 6845570-n
Descripción Auerbach Publishers, Incorporated. Estado de conservación: Brand New. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Nº de ref. de la librería 42303188
Descripción Auerbach Publications, 2012. HRD. Estado de conservación: New. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Nº de ref. de la librería F9-9781439801963
Descripción Auerbach Publishers, Incorporated. Estado de conservación: Brand New. Dispatch Same Working Day, (Delivery 2-4 business days, Courier For Heavy/Expensive Items) Money Back Guarantee, 99.3% Customer Satisfaction, Prompt Customer Service. Nº de ref. de la librería 41975541
Descripción Auerbach Publications, 2011. Estado de conservación: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: SCADA -- Supervisory Control and Data Acquisition --. Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed "cookbook" that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern. Nº de ref. de la librería ABE_book_new_1439801967
Descripción 2009. Hardcover. Estado de conservación: New. 163mm x 18mm x 236mm. Hardcover. As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisti.Shipping may be from multiple locations in the US or from the UK, depending on stock availability. 203 pages. 0.476. Nº de ref. de la librería 9781439801963
Descripción Auerbach Publications, 2016. Hardback. Estado de conservación: NEW. 9781439801963 This listing is a new book, a title currently in-print which we order directly and immediately from the publisher. Print on Demand title, produced to the highest standard, and there would be a delay in dispatch of around 10 working days. Nº de ref. de la librería HTANDREE0199360
Descripción Auerbach Pub, 2011. Hardcover. Estado de conservación: Brand New. 1st edition. 203 pages. 9.25x6.25x0.75 inches. In Stock. Nº de ref. de la librería __1439801967
Descripción Taylor & Francis Ltd. see description. Estado de conservación: New. AUTHOR: Macaulay, Tyson. PUBLISHER: Taylor & Francis Ltd. FORMAT: Hardback. DATE: 15/02/2010. EAN : 9781439801963. Nº de ref. de la librería RS-38320
Descripción Auerbach Publications, 2011. Hardcover. Estado de conservación: New. 1. Nº de ref. de la librería DADAX1439801967