As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.
Authors Eric Knapp and Joel Langill examine the unique protocols and applications that are the foundation of Industrial Control Systems (ICS), and provide clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
"...worth recommendation for people who are interested in modern industry control systems security. Additionally, it will be advantageous for university researchers and graduate students in the network security field, as well as to industry specialists in the area of ICS." --IEEE Communications Magazine
Authors Eric Knapp and Joel Langill examine the unique protocols and applications that are the foundation of Industrial Control Systems (ICS), and provide clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
"...worth recommendation for people who are interested in modern industry control systems security. Additionally, it will be advantageous for university researchers and graduate students in the network security field, as well as to industry specialists in the area of ICS." --IEEE Communications Magazine
- All-new real-world examples of attacks against control systems such as Trisys, Pipedream, and more diagrams of systems
- Includes all-new chapters on USB security and OT Cyber Kill Chains, including the lifecycle of an incident response from detection to recovery
- Expanded coverage of network anomaly detection and Beachhead systems for extensive monitoring and detection
- New coverage of network spans, mirrors, and taps, as well as asset discovery, log collection, and industrial-focused SIEM solution
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.