Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
Contents: Ch. 1. Introduction -- ch. 2. Threats to ICS -- ch. 3. ICS vulnerabilities -- ch. 4. Risk assessment techniques -- ch. 5. What is next in ICS security?
Saved in:
Main Author: | Tyson Macaulay and Bryan Singer. |
---|---|
Format: | Book |
Language: | English |
Published: |
CRC Press
2020
|
Subjects: | |
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/14239 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Network Security: an Introduction to Techniques and Standard
by: Waidah Ismail, et al.
Published: (2009) -
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019) -
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014) -
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003) -
Cybersecurity Awareness Tracker (CySAT) / Anas Rayyan Muhammad Shaifuddin ... [et al.]
by: Muhammad Shaifuddin, Anas Rayyan, et al.
Published: (2021)