Published by VDM Verlag Dr. Mueller E.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 50.94
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by VDM Verlag Dr. Mueller E.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 54.58
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Published by VDM Verlag Dr. Mueller e.K. 2008-02-20, 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 51.59
Convert currencyQuantity: 10 available
Add to basketPaperback. Condition: New.
Published by VDM Verlag Dr. Mueller E.K. 2/20/2008, 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Security Assessment of SCADA Protocols - A Taxonomy Based Methodology for the Identification of Security Vulnerabilities in SCADA Protocols 0.42. Book.
Published by VDM Verlag Dr. Mueller E.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: moluna, Greven, Germany
US$ 65.14
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by VDM Verlag Dr. Müller Mär 2008, 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 80.95
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware - Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.
Seller: Mispah books, Redhill, SURRE, United Kingdom
US$ 122.25
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Like New. Like New. book.
Published by VDM Verlag Dr. Mueller e.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: Mispah books, Redhill, SURRE, United Kingdom
US$ 131.86
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Like New. Like New. book.
Published by VDM Verlag Dr. Mueller E.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by VDM Verlag Dr. Mueller E.K., 2008
ISBN 10: 3836459906 ISBN 13: 9783836459907
Language: English
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 57.42
Convert currencyQuantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by AV Akademikerverlag Jul 2012, 2012
ISBN 10: 3639435796 ISBN 13: 9783639435795
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
US$ 58.86
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Revision with unchanged content. Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols. 116 pp. Englisch.
Seller: moluna, Greven, Germany
US$ 47.14
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Igure Vinay M.received his PhD and MS degrees in Electrical Engineering from the University of Virginia, USA. He received his BE degree in Electronics and Communication Engineering from Mysore University, India.He is a member of the .
Published by AV Akademikerverlag Jul 2012, 2012
ISBN 10: 3639435796 ISBN 13: 9783639435795
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
US$ 58.86
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Revision with unchanged content. Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 116 pp. Englisch.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 58.86
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Revision with unchanged content. Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.