Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS (Record no. 1329)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | nam a22 7a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20180328165528.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180328b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 978-1-4398-0196-3 |
028 ## - PUBLISHER NUMBER | |
Source | Allied Informatics, Jaipur |
Bill Number | 4647 |
Bill Date | 03/03/2018 |
Purchase Year | 2017-18 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BSDU |
Language of cataloging | English |
Transcribing agency | BSDU |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.478 |
Item number | JHA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Macaulay, Tyson & Singer, Bryan |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca tatan, FL, USA |
Name of publisher, distributor, etc. | CRC Press/Auerbach Publications/taylor & Francis Group |
Date of publication, distribution, etc. | 2012 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 193 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Introduction Convergence by Another Name Threats to ICS ICS Vulnerabilities Risk Assessment Techniques What Is Next in ICS Security? |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electrical |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not For Loan | Reference | BSDU Knowledge Resource Center, Jaipur | BSDU Knowledge Resource Center, Jaipur | Reference | 2018-03-28 | 5023.00 | 658.478 JHA | 014495 | 2020-02-12 | 2018-03-28 | Books |