Techno Security’s Guide to Securing SCADA: Protecting Critical Infrastructure

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical InfrastructureAround the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.

This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a “sit-down” with the leaders in the field

Price: $72.95

Click here to buy from Amazon

Practical SCADA for Industry (IDC Technology)

Practical SCADA for Industry (IDC Technology)A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion. SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system.

An engineer's introduction to Supervisory Control and Data Acquisition (SCADA) systems and their application in monitoring and controlling equipment and industrial plant.

Essential reading for data acquisition and control professionals in plant engineering, manufacturing, telecommunications, water and waste control, energy, oil and gas refining and transportation.

Provides the knowledge to analyse, specify and debug SCADA systems, covering the fundamentals of hardware, software and the communications systems that connect SCADA operator stations

Price: $66.95

Click here to buy from Amazon

Prozessvisualisierung unter Windows. Überwachung Steuerung technischer Prozesse

Prozessvisualisierung unter Windows. Überwachung und Steuerung technischer Prozesse ( SCADA).SCADA – Supervisory Control and Data Acquisition – Systems don't necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed ‘cookbook' that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.





Price:

Click here to buy from Amazon

Qualification of SCADA Systems: Incorporating Case Study 1

Qualification of SCADA Systems: Incorporating Case Study 1Terrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.

Price:

Click here to buy from Amazon

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)The information infrastructure–comprising computers, embedded devices, networks and software systems–is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.





Price: $149.00

Click here to buy from Amazon