Prozessvisualisierung unter Windows. Überwachung Steuerung technischer Prozesse
SCADA – Supervisory Control and Data Acquisition – Systems don’t necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed ‘cookbook’ that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.