Cybersecurity for SCADA Systems

PennWell Books
3
Free sample

SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault is becoming a test of will, cleverness and determination. Cybersecurity for Industrial SCADA provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.





Benefits for readers: Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system; IT and cybersecurity technology and terminology overview and explanation; Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies; and Discussion of physical and electronic security issues and strategies

Suitable for the non-technical management level personnel as well as IT personnel without SCADA experience SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault is becoming a test of will, cleverness and determination. Cybersecurity for Industrial SCADA provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.





Benefits for readers: Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system; IT and cybersecurity technology and terminology overview and explanation; Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies; and Discussion of physical and electronic security issues and strategies

Suitable for the non-technical management level personnel as well as IT personnel without SCADA experience
Read more

About the author

William Shaw is a tutor in Mathematics at St Catherine's College, Oxford.

Read more
4.0
3 total
Loading...

Additional Information

Publisher
PennWell Books
Read more
Published on
Dec 31, 2006
Read more
Pages
562
Read more
ISBN
9781593700683
Read more
Language
English
Read more
Genres
Business & Economics / Industries / Computers & Information Technology
Business & Economics / Industries / Energy
Business & Economics / Industries / General
Computers / Security / General
Technology & Engineering / Automation
Technology & Engineering / Industrial Technology
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
NATIONAL BESTSELLER

Developing video games—hero's journey or fool's errand? The creative and technical logistics that go into building today's hottest games can be more harrowing and complex than the games themselves, often seeming like an endless maze or a bottomless abyss. In Blood, Sweat, and Pixels, Jason Schreier takes readers on a fascinating odyssey behind the scenes of video game development, where the creator may be a team of 600 overworked underdogs or a solitary geek genius. Exploring the artistic challenges, technical impossibilities, marketplace demands, and Donkey Kong-sized monkey wrenches thrown into the works by corporate, Blood, Sweat, and Pixels reveals how bringing any game to completion is more than Sisyphean—it's nothing short of miraculous.

Taking some of the most popular, bestselling recent games, Schreier immerses readers in the hellfire of the development process, whether it's RPG studio Bioware's challenge to beat an impossible schedule and overcome countless technical nightmares to build Dragon Age: Inquisition; indie developer Eric Barone's single-handed efforts to grow country-life RPG Stardew Valley from one man's vision into a multi-million-dollar franchise; or Bungie spinning out from their corporate overlords at Microsoft to create Destiny, a brand new universe that they hoped would become as iconic as Star Wars and Lord of the Rings—even as it nearly ripped their studio apart.

Documenting the round-the-clock crunches, buggy-eyed burnout, and last-minute saves, Blood, Sweat, and Pixels is a journey through development hell—and ultimately a tribute to the dedicated diehards and unsung heroes who scale mountains of obstacles in their quests to create the best games imaginable.

“At the core, Hit Refresh, is about us humans and the unique quality we call empathy, which will become ever more valuable in a world where the torrent of technology will disrupt the status quo like never before.” – Satya Nadella from Hit Refresh

“Satya has charted a course for making the most of the opportunities created by technology while also facing up to the hard questions.” – Bill Gates from the Foreword of Hit Refresh

The New York Times bestseller Hit Refresh is about individual change, about the transformation happening inside of Microsoft and the technology that will soon impact all of our lives—the arrival of the most exciting and disruptive wave of technology humankind has experienced: artificial intelligence, mixed reality, and quantum computing. It’s about how people, organizations, and societies can and must transform and “hit refresh” in their persistent quest for new energy, new ideas, and continued relevance and renewal. 

Microsoft’s CEO tells the inside story of the company’s continuing transformation, tracing his own personal journey from a childhood in India to leading some of the most significant technological changes in the digital era. Satya Nadella explores a fascinating childhood before immigrating to the U.S. and how he learned to lead along the way. He then shares his meditations as a sitting CEO—one who is mostly unknown following the brainy Bill Gates and energetic Steve Ballmer. He tells the inside story of how a company rediscovered its soul—transforming everything from culture to their fiercely competitive landscape and industry partnerships. As much a humanist as engineer and executive, Nadella concludes with his vision for the coming wave of technology and by exploring the potential impact to society and delivering call to action for world leaders.

“Ideas excite me,” Nadella explains. “Empathy grounds and centers me.” Hit Refresh is a set of reflections, meditations, and recommendations presented as algorithms from a principled, deliberative leader searching for improvement—for himself, for a storied company, and for society.

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015


One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined. 

Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services. 
     Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.
     With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.
     Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.


From the Hardcover edition.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.