Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/14239
DC FieldValueLanguage
dc.contributor.authorTyson Macaulay and Bryan Singer.en_US
dc.date.accessioned2020-06-12T10:01:10Z-
dc.date.available2020-06-12T10:01:10Z-
dc.date.issued2011-
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/14239-
dc.descriptionContents: Ch. 1. Introduction -- ch. 2. Threats to ICS -- ch. 3. ICS vulnerabilities -- ch. 4. Risk assessment techniques -- ch. 5. What is next in ICS security?en_US
dc.description.abstractAs industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and imen_US
dc.language.isoenen_US
dc.publisherCRC Pressen_US
dc.subjectProcess control -- Security measures; Automatic machinery -- Security measures; Computer security; BUSINESS & ECONOMICS -- Corporate Governance; BUSINESS & ECONOMICS -- Leadership; BUSINESS & ECONOMICS -- Organizational Development; BUSINESS & ECONOMICS -- Workplace Culture; Electronic books;en_US
dc.titleCybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SISen_US
dc.typeBooken_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:UNITEN Energy Collection
Files in This Item:
File Description SizeFormat 
Cybersecurity for Industrial Control Systems.pdf5.1 MBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.