WELCOME TO BSDU - KNOWLEDGE RESOURCE CENTER


BHARTIYA SKILL DEVELOPMENT UNIVERSITY, JAIPUR
KNOWLEDGE RESOURCE CENTER (LIBRARY)
Online Public Access catalogue(OPAC)

“Library is a heart of an institution" ― Dr S. Radhakrishnan

“Never Stop Reading"

Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS (Record no. 1329)

000 -LEADER
fixed length control field nam a22 7a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180328165528.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180328b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-1-4398-0196-3
028 ## - PUBLISHER NUMBER
Source Allied Informatics, Jaipur
Bill Number 4647
Bill Date 03/03/2018
Purchase Year 2017-18
040 ## - CATALOGING SOURCE
Original cataloging agency BSDU
Language of cataloging English
Transcribing agency BSDU
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.478
Item number JHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Macaulay, Tyson & Singer, Bryan
245 ## - TITLE STATEMENT
Title Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca tatan, FL, USA
Name of publisher, distributor, etc. CRC Press/Auerbach Publications/taylor & Francis Group
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
Extent 193
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Introduction
Convergence by Another Name
Threats to ICS
ICS Vulnerabilities
Risk Assessment Techniques
What Is Next in ICS Security?
520 ## - SUMMARY, ETC.
Summary, etc. The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electrical
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Price effective from Koha item type
        Not For Loan Reference BSDU Knowledge Resource Center, Jaipur BSDU Knowledge Resource Center, Jaipur Reference 2018-03-28 5023.00 658.478 JHA 014495 2020-02-12 2018-03-28 Books

2019. All rights reserved.
Implemented & Maintained by Total IT Software Solutions Pvt. Ltd.