SISTEMAS SCADA (Spanish Edition)

SISTEMAS SCADA (Spanish Edition)El germen de este libro fue la idea de elaborar un manual práctico sobre un programa Scada muy extendido a nivel mundial, conocido como Intouch, de Wonderware. La idea no era original y, para darle algo más de interés técnico y pretender un público más amplio, se fueron añadiendo referencias sobre los ámbitos más directamente relacionados con los programas Scada: diseño, ergonomía, normativa, comunicaciones y seguridad.





Price: $56.12

Click here to buy from Amazon

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, ... in Information and Communication Technology)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection IV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, and Risk Management. This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at the National Defense University, Washington, DC, USA in the spring of 2010. Critical Infrastructure Protection IV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Tyler Moore is a Postdoctoral Fellow at the Center for Research on Computation and Society, Harvard University, Cambridge, Massachusetts, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $109.00

Click here to buy from Amazon

Cybersecurity for SCADA Systems

Cybersecurity for SCADA SystemsSCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault is becoming a test of will, cleverness and determination. Cybersecurity for SCADA Systems provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.

Benefits for readers: Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system; IT and cybersecurity technology and terminology overview and explanation; Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies; and Discussion of physical and electronic security issues and strategies

Suitable for the non-technical management level personnel as well as IT personnel without SCADA experience

Price: $89.00

Click here to buy from Amazon

Safeguarding Infrastructure from Cyber-terrorism: Measuring and Protecting SCADA

Safeguarding Infrastructure Assets from Cyber-terrorism: Measuring and Protecting SCADA systems from Cyber-terrorists in AustraliaTerrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.

Price: $111.00

Click here to buy from Amazon

Security Assessment of SCADA Protocols

Security Assessment of SCADA Protocols - A Taxonomy Based Methodology for the Identification of Security Vulnerabilities in SCADA ProtocolsModern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.

Price: $64.00

Click here to buy from Amazon