Securing Critical Infrastructures and Critical Control Systems

Approaches for Threat Protection

Nonfiction, Computers, Internet, Security, Application Software, Computer Security, General Computing
Cover of the book Securing Critical Infrastructures and Critical Control Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466626904
Publisher: IGI Global Publication: December 31, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466626904
Publisher: IGI Global
Publication: December 31, 2012
Imprint: Information Science Reference
Language: English
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

More books from IGI Global

Cover of the book Exploring Innovative and Successful Applications of Soft Computing by
Cover of the book Anonymity and Learning in Digitally Mediated Communications by
Cover of the book Handbook of Research on Big Data Storage and Visualization Techniques by
Cover of the book Advocacy in Academia and the Role of Teacher Preparation Programs by
Cover of the book Utilizing Consumer Psychology in Business Strategy by
Cover of the book Fostering Sustained Learning Among Undergraduate Students by
Cover of the book Motivationally Intelligent Leadership by
Cover of the book Network Security Technologies by
Cover of the book Student Engagement and Participation by
Cover of the book Redefining Translation and Interpretation in Cultural Evolution by
Cover of the book Adoption and Optimization of Embedded and Real-Time Communication Systems by
Cover of the book Intelligent Multidimensional Data and Image Processing by
Cover of the book Maintaining Sustainable Accounting Systems in Small Business by
Cover of the book Comparative Political and Economic Perspectives on the MENA Region by
Cover of the book Social Media and Networking by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy