Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/14239
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tyson Macaulay and Bryan Singer. | en_US |
dc.date.accessioned | 2020-06-12T10:01:10Z | - |
dc.date.available | 2020-06-12T10:01:10Z | - |
dc.date.issued | 2011 | - |
dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/14239 | - |
dc.description | Contents: Ch. 1. Introduction -- ch. 2. Threats to ICS -- ch. 3. ICS vulnerabilities -- ch. 4. Risk assessment techniques -- ch. 5. What is next in ICS security? | en_US |
dc.description.abstract | As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im | en_US |
dc.language.iso | en | en_US |
dc.publisher | CRC Press | en_US |
dc.subject | Process control -- Security measures; Automatic machinery -- Security measures; Computer security; BUSINESS & ECONOMICS -- Corporate Governance; BUSINESS & ECONOMICS -- Leadership; BUSINESS & ECONOMICS -- Organizational Development; BUSINESS & ECONOMICS -- Workplace Culture; Electronic books; | en_US |
dc.title | Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS | en_US |
dc.type | Book | en_US |
item.grantfulltext | restricted | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | UNITEN Energy Collection |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cybersecurity for Industrial Control Systems.pdf | 5.1 MB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.