Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS

Contents: Ch. 1. Introduction -- ch. 2. Threats to ICS -- ch. 3. ICS vulnerabilities -- ch. 4. Risk assessment techniques -- ch. 5. What is next in ICS security?

Saved in:
Bibliographic Details
Main Author: Tyson Macaulay and Bryan Singer.
Format: Book
Language:English
Published: CRC Press 2020
Subjects:
Online Access:http://dspace.uniten.edu.my/jspui/handle/123456789/14239
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Contents: Ch. 1. Introduction -- ch. 2. Threats to ICS -- ch. 3. ICS vulnerabilities -- ch. 4. Risk assessment techniques -- ch. 5. What is next in ICS security?