Securing Critical Infrastructures and Critical Control Systems

Approaches for Threat Protection

Nonfiction, Computers, Internet, Security, Application Software, Computer Security, General Computing
Cover of the book Securing Critical Infrastructures and Critical Control Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466626904
Publisher: IGI Global Publication: December 31, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466626904
Publisher: IGI Global
Publication: December 31, 2012
Imprint: Information Science Reference
Language: English
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

More books from IGI Global

Cover of the book Intelligent Techniques for Data Analysis in Diverse Settings by
Cover of the book Developing and Evaluating Security-Aware Software Systems by
Cover of the book Simulation in Computational Finance and Economics by
Cover of the book Pattern Recognition and Signal Processing in Archaeometry by
Cover of the book International Financial Reporting Standards and New Directions in Earnings Management by
Cover of the book Educational Technology and Resources for Synchronous Learning in Higher Education by
Cover of the book Prevention and Detection of Academic Misconduct in Higher Education by
Cover of the book Technology and Its Impact on Educational Leadership by
Cover of the book Model-Based Design for Effective Control System Development by
Cover of the book Virtual Reality in Education by
Cover of the book Handbook of Research on Communities of Practice for Organizational Management and Networking by
Cover of the book Methods, Models, and Computation for Medical Informatics by
Cover of the book Technology Engineering and Management in Aviation by
Cover of the book Affective Computing and Interaction by
Cover of the book Handbook of Research on Enterprise 2.0 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy