Artboard 33Artboard 16Artboard 18Artboard 13Artboard 42Artboard 21Artboard 4Artboard 5Artboard 45Artboard 22Artboard 7Artboard 42Artboard 23Artboard 12Artboard 28Artboard 17?Artboard 28Artboard 43Artboard 49Artboard 47Artboard 15Artboard 32Artboard 6Artboard 22Artboard 5Artboard 25Artboard 1Artboard 42Artboard 11Artboard 41Artboard 11Artboard 23Artboard 10Artboard 4Artboard 9Artboard 6Artboard 8Artboard 7Artboard 3Artboard 12Artboard 25Artboard 34Artboard 43Artboard 44Artboard 16Artboard 24Artboard 13Artboard 5Artboard 24Artboard 31Artboard 1Artboard 12Artboard 27Artboard 30Artboard 36Artboard 44Artboard 9Artboard 17Artboard 6Artboard 27Artboard 30Artboard 29Artboard 26Artboard 2Artboard 20Artboard 35Artboard 15Artboard 14Artboard 50Artboard 26Artboard 14Artboard 40Artboard 21Artboard 10Artboard 37Artboard 46Artboard 33Artboard 8
e-book

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infra (Cód: 3029887)

Wiles,Jack; Claypoole, Ted; Drake,Phil

Syngress Digital

Ooops! Este produto não está mais a venda.
Mas não se preocupe, temos uma versão atualizada para você.

Ooopss! Este produto está fora de linha, mas temos outras opções para você.
Veja nossas sugestões abaixo!

R$ 212,60

em até 7x de R$ 30,37 sem juros

Total:

Em até 1x sem juros de


Crédito:
Boleto:
Cartão Saraiva:

Total:

Em até 7x sem juros de


Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infra

R$212,60

Descrição

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.

This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a 'sit-down' with the leaders in the field

Características

Peso 0.00 Kg
Produto sob encomenda Não
Marca Syngress Digital
Número de Páginas 352 (aproximado)
Idioma 337
Acabamento e-book
Territorialidade Internacional
Formato Livro Digital Epub
Gratuito Não
Proteção Drm Sim
Tamanho do Arquivo 5604
Início da Venda 22/11/2012
Código do Formato Epub
Cód. Barras 9780080569994
Ano da edição 72008
Ano da Publicação 108
AutorWiles,Jack; Claypoole, Ted; Drake,Phil