skip to content
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems Preview this item
ClosePreview this item
Checking...

Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems

Author: Eric D Knapp; Joel Thomas Langill
Publisher: Waltham, MA : Syngress, [2015] ©2015
Edition/Format:   eBook : Document : English : Second editionView all editions and formats
Summary:
This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Knapp, Eric D.
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems.
Waltham, Massachusetts : Syngress, ©2015
xix, 439 pages
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Eric D Knapp; Joel Thomas Langill
ISBN: 9780124201842 0124201849 0124201148 9780124201149
OCLC Number: 900652416
Description: 1 online resource (1 volume) : illustrations
Contents: Machine generated contents note: ch. 1 Introduction --
Book Overview and Key Learning Points --
Book Audience --
Diagrams and Figures --
The Smart Grid --
How This Book is Organized --
ch. 2 About Industrial Networks --
ch. 3 Industrial Cyber Security, History, and Trends --
ch. 4 Introduction to ICS and Operations --
ch. 5 ICS Network Design and Architecture --
ch. 6 Industrial Network Protocols --
ch. 7 Hacking Industrial Systems --
ch. 8 Risk and Vulnerability Assessments --
ch. 9 Establishing Zones and Conduits --
ch. 10 Implementing Security and Access Controls --
ch. 11 Exception, Anomaly, and Threat Detection --
ch. 12 Security Monitoring of Industrial Control Systems --
ch. 13 Standards and Regulations --
Changes Made to the Second Edition --
Conclusion --
ch. 2 About Industrial Networks --
The Use of Terminology Within This Book --
Attacks, Breaches, and Incidents: Malware, Exploits, and APTs --
Assets, Critical Assets, Cyber Assets, and Critical Cyber Assets Note continued: Security Controls and Security Countermeasures --
Firewalls and Intrusion Prevention Systems --
Industrial Control System --
DCS or SCADA? --
Industrial Networks --
Industrial Protocols --
Networks, Routable Networks, and Nonroutable Networks --
Enterprise or Business Networks --
Zones and Enclaves --
Network Perimeters or "Electronic Security Perimeters" --
Critical Infrastructure --
Common Industrial Security Recommendations --
Identification of Critical Systems --
Network Segmentation/Isolation of Systems --
Defense in Depth --
Access Control --
Advanced Industrial Security Recommendations --
Security Monitoring --
Policy Whitelisting --
Application Whitelisting --
Common Misperceptions About Industrial Network Security --
Assumptions Made in This Book --
Summary --
Endnotes --
ch. 3 Industrial Cyber Security History and Trends --
Importance of Securing Industrial Networks --
The Evolution of the Cyber Threat --
APTs and Weaponized Malware Note continued: Still to Come --
Defending Against Modern Cyber Threats --
Insider Threats --
Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War --
Summary --
Endnotes --
ch. 4 Introduction to Industrial Control Systems and Operations --
System Assets --
Programmable Logic Controller --
Remote Terminal Unit --
Intelligent Electronic Device --
Human-Machine Interface --
Supervisory Workstations --
Data Historian --
Business Information Consoles and Dashboards --
Other Assets --
System Operations --
Control Loops --
Control Processes --
Feedback Loops --
Production Information Management --
Business Information Management --
Process Management --
Safety Instrumented Systems --
The Smart Grid --
Network Architectures --
Summary --
Endnotes --
ch. 5 Industrial Network Design and Architecture --
Introduction to Industrial Networking --
Common Topologies --
Network Segmentation --
Higher Layer Segmentation --
Physical vs. Logical Segmentation --
Network Services Note continued: Wireless Networks --
Remote Access --
Performance Considerations --
Latency and Jitter --
Bandwidth and Throughput --
Type of Service, Class of Service, and Quality of Service --
Network Hops --
Network Security Controls --
Safety Instrumented Systems --
Special Considerations --
Wide Area Connectivity --
Smart Grid Network Considerations --
Advanced Metering Infrastructure --
Summary --
Endnotes --
ch. 6 Industrial Network Protocols --
Overview of Industrial Network Protocols --
Fieldbus Protocols --
Modicon Communication Bus --
Distributed Network Protocol --
Process Fieldbus --
Industrial Ethernet Protocols --
Ethernet Industrial Protocol --
PROFLNET --
EtherCAT --
Ethernet POWERLINK --
SERCOS III --
Backend Protocols --
Open Process Communications --
Inter-Control Center Communications Protocol --
Advanced Metering Infrastructure and the Smart Grid --
Security Concerns --
Security Recommendations --
Industrial Protocol Simulators --
Modbus Note continued: DNP3/IEC 60870-5 --
OPC --
ICCP / IEC 60870-6 (TASE.2) --
Physical Hardware --
Summary --
Endnotes --
ch. 7 Hacking Industrial Control Systems --
Motives and Consequences --
Consequences of a Successful Cyber Incident --
Cyber Security and Safety --
Common Industrial Targets --
Common Attack Methods --
Man-in-the-Middle Attacks --
Denial-of-Service Attacks --
Replay Attacks --
Compromising the Human-Machine Interface --
Compromising the Engineering Workstation --
Blended Attacks --
Examples of Weaponized Industrial Cyber Threats --
Stuxnet --
Shamoon/DistTrack --
Flame/Flamer/Skywiper --
Attack Trends --
Evolving Vulnerabilities: The Adobe Exploits --
Industrial Application Layer Attacks --
Antisocial Networks: A New Playground for Malware --
Dealing with an Infection --
Summary --
Endnotes --
ch. 8 Risk and Vulnerability Assessments --
Cyber Security and Risk Management --
Why Risk Management is the Foundation of Cyber Security --
What is Risk? Note continued: Standards and Best Practices for Risk Management --
Methodologies for Assessing Risk Within Industrial Control Systems --
Security Tests --
Establishing a Testing and Assessment Methodology --
System Characterization --
Data Collection --
Scanning of Industrial Networks --
Threat Identification --
Threat Actors/Sources --
Threat Vectors --
Threat Events --
Identification of Threats During Security Assessments --
Vulnerability Identification --
Vulnerability Scanning --
Configuration Auditing --
Vulnerability Prioritization --
Risk Classification and Ranking --
Consequences and Impact --
How to Estimate Consequences and Likelihood --
Risk Ranking --
Risk Reduction and Mitigation --
Summary --
Endnotes --
ch. 9 Establishing Zones and Conduits --
Security Zones and Conduits Explained --
Identifying and Classifying Security Zones and Conduits --
Recommended Security Zone Separation --
Network Connectivity --
Control Loops --
Supervisory Controls Note continued: Plant Level Control Processes --
Control Data Storage --
Trading Communications --
Remote Access --
Users and Roles --
Protocols --
Criticality --
Establishing Security Zones and Conduits --
Summary --
Endnotes --
ch. 10 Implementing Security and Access Controls --
Network Segmentation --
Zones and Security Policy Development --
Using Zones within Security Device Configurations --
Implementing Network Security Controls --
Selecting Network Security Devices --
Implementing Network Security Devices --
Implementing Host Security and Access Controls --
Selecting Host Cyber Security Systems --
External Controls --
Patch Management --
How Much Security is Enough? --
Summary --
Endnotes --
ch. 11 Exception, Anomaly, and Threat Detection --
Exception Reporting --
Behavioral Anomaly Detection --
Measuring Baselines --
Anomaly Detection --
Behavioral Whitelisting --
User Whitelists --
Asset Whitelists --
Application Behavior Whitelists --
Threat Detection Note continued: Event Correlation --
Correlating Between IT and OT Systems --
Summary --
Endnotes --
ch. 12 Security Monitoring of Industrial Control Systems --
Determining what to Monitor --
Security Events --
Assets --
Configurations --
Applications --
Networks --
User Identities and Authentication --
Additional Context --
Behavior --
Successfully Monitoring Security Zones --
Log Collection --
Direct Monitoring --
Inferred Monitoring --
Information Collection and Management Tools --
Monitoring Across Secure Boundaries --
Information Management --
Queries --
Reports --
Alerts --
Incident Investigation and Response --
Log Storage and Retention --
Nonrepudiation --
Data Retention/Storage --
Data Availability --
Summary --
Endnotes --
ch. 13 Standards and Regulations --
Common Standards and Regulations --
NERC CIP --
CFATS --
ISO/TEC 27002 --
NRC Regulation 5.71 --
NIST SP 800-82 --
ISA/IEC-62443 --
ISA 62443 Group 1 "General" Note continued: ISA 62443 Group 2 "Policies and Procedures" --
ISA 62443 Group 3 "System" --
ISA 62443 Group 4 "Component" --
Mapping Industrial Network Security to Compliance --
Industry Best Practices for Conducting ICS Assessments --
Department of Homeland Security (USA) / Centre for Protection of National Infrastructure (UK) --
National Security Agency (USA) --
American Petroleum Institute (USA) / National Petrochemical and Refiners Association (USA) --
Institute for Security and Open Methodologies (Spain) --
Common Criteria and FTPS Standards --
Common Criteria --
FIPS 140-2 --
Summary --
Endnotes --
Appendix A Protocol Resources --
Modbus Organization --
DNP3 Users Group --
OPC Foundation --
Common Industrial Protocol (CIP) / Open Device Vendor Association (ODVA) --
PROFD3US & PROFINET International (PI) --
Appendix B Standards Organizations --
North American Reliability Corporation (NERC) --
The United States Nuclear Regulatory --
Commission (NRC) Note continued: NRC Title 10 CFR 73.54 --
NRC RG 5.71 --
United States Department of Homeland Security --
Chemical Facilities Anti-Terrorism Standard (CFATS) --
CFATS Risk-Based Performance Standards (RBPS) --
International Society of Automation (ISA) --
International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) --
Appendix C NIST Security Guidelines --
National Institute of Standards and Technology, Special Publications 800 Series --
Glossary --
Endnotes.
Other Titles: Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
Responsibility: Eric D. Knapp, Joel Thomas Langill.

Abstract:

This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Topics Include: all-new real-world examples of attacks against control systems, and more diagrams of systems; expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering. --

Reviews

Editorial reviews

Publisher Synopsis

"...worth recommendation for people who are interested in modern industry control systems security. Additionally, it will be advantageous for university researchers and graduate students in the Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/900652416> # Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "900652416" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://dewey.info/class/670.427/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/865549077#Topic/process_control_security_measures> ; # Process control--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/865549077#Topic/computer_security> ; # Computer security
    schema:alternateName "Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems" ;
    schema:author <http://experiment.worldcat.org/entity/work/data/865549077#Person/langill_joel_thomas> ; # Joel Thomas Langill
    schema:author <http://experiment.worldcat.org/entity/work/data/865549077#Person/knapp_eric_d> ; # Eric D. Knapp
    schema:bookEdition "Second edition." ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2015" ;
    schema:description "Note continued: Standards and Best Practices for Risk Management -- Methodologies for Assessing Risk Within Industrial Control Systems -- Security Tests -- Establishing a Testing and Assessment Methodology -- System Characterization -- Data Collection -- Scanning of Industrial Networks -- Threat Identification -- Threat Actors/Sources -- Threat Vectors -- Threat Events -- Identification of Threats During Security Assessments -- Vulnerability Identification -- Vulnerability Scanning -- Configuration Auditing -- Vulnerability Prioritization -- Risk Classification and Ranking -- Consequences and Impact -- How to Estimate Consequences and Likelihood -- Risk Ranking -- Risk Reduction and Mitigation -- Summary -- Endnotes -- ch. 9 Establishing Zones and Conduits -- Security Zones and Conduits Explained -- Identifying and Classifying Security Zones and Conduits -- Recommended Security Zone Separation -- Network Connectivity -- Control Loops -- Supervisory Controls"@en ;
    schema:description "Note continued: NRC Title 10 CFR 73.54 -- NRC RG 5.71 -- United States Department of Homeland Security -- Chemical Facilities Anti-Terrorism Standard (CFATS) -- CFATS Risk-Based Performance Standards (RBPS) -- International Society of Automation (ISA) -- International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) -- Appendix C NIST Security Guidelines -- National Institute of Standards and Technology, Special Publications 800 Series -- Glossary -- Endnotes."@en ;
    schema:description "Note continued: ISA 62443 Group 2 "Policies and Procedures" -- ISA 62443 Group 3 "System" -- ISA 62443 Group 4 "Component" -- Mapping Industrial Network Security to Compliance -- Industry Best Practices for Conducting ICS Assessments -- Department of Homeland Security (USA) / Centre for Protection of National Infrastructure (UK) -- National Security Agency (USA) -- American Petroleum Institute (USA) / National Petrochemical and Refiners Association (USA) -- Institute for Security and Open Methodologies (Spain) -- Common Criteria and FTPS Standards -- Common Criteria -- FIPS 140-2 -- Summary -- Endnotes -- Appendix A Protocol Resources -- Modbus Organization -- DNP3 Users Group -- OPC Foundation -- Common Industrial Protocol (CIP) / Open Device Vendor Association (ODVA) -- PROFD3US & PROFINET International (PI) -- Appendix B Standards Organizations -- North American Reliability Corporation (NERC) -- The United States Nuclear Regulatory -- Commission (NRC)"@en ;
    schema:description "Note continued: Plant Level Control Processes -- Control Data Storage -- Trading Communications -- Remote Access -- Users and Roles -- Protocols -- Criticality -- Establishing Security Zones and Conduits -- Summary -- Endnotes -- ch. 10 Implementing Security and Access Controls -- Network Segmentation -- Zones and Security Policy Development -- Using Zones within Security Device Configurations -- Implementing Network Security Controls -- Selecting Network Security Devices -- Implementing Network Security Devices -- Implementing Host Security and Access Controls -- Selecting Host Cyber Security Systems -- External Controls -- Patch Management -- How Much Security is Enough? -- Summary -- Endnotes -- ch. 11 Exception, Anomaly, and Threat Detection -- Exception Reporting -- Behavioral Anomaly Detection -- Measuring Baselines -- Anomaly Detection -- Behavioral Whitelisting -- User Whitelists -- Asset Whitelists -- Application Behavior Whitelists -- Threat Detection"@en ;
    schema:description "Note continued: Security Controls and Security Countermeasures -- Firewalls and Intrusion Prevention Systems -- Industrial Control System -- DCS or SCADA? -- Industrial Networks -- Industrial Protocols -- Networks, Routable Networks, and Nonroutable Networks -- Enterprise or Business Networks -- Zones and Enclaves -- Network Perimeters or "Electronic Security Perimeters" -- Critical Infrastructure -- Common Industrial Security Recommendations -- Identification of Critical Systems -- Network Segmentation/Isolation of Systems -- Defense in Depth -- Access Control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy Whitelisting -- Application Whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions Made in This Book -- Summary -- Endnotes -- ch. 3 Industrial Cyber Security History and Trends -- Importance of Securing Industrial Networks -- The Evolution of the Cyber Threat -- APTs and Weaponized Malware"@en ;
    schema:description "Note continued: DNP3/IEC 60870-5 -- OPC -- ICCP / IEC 60870-6 (TASE.2) -- Physical Hardware -- Summary -- Endnotes -- ch. 7 Hacking Industrial Control Systems -- Motives and Consequences -- Consequences of a Successful Cyber Incident -- Cyber Security and Safety -- Common Industrial Targets -- Common Attack Methods -- Man-in-the-Middle Attacks -- Denial-of-Service Attacks -- Replay Attacks -- Compromising the Human-Machine Interface -- Compromising the Engineering Workstation -- Blended Attacks -- Examples of Weaponized Industrial Cyber Threats -- Stuxnet -- Shamoon/DistTrack -- Flame/Flamer/Skywiper -- Attack Trends -- Evolving Vulnerabilities: The Adobe Exploits -- Industrial Application Layer Attacks -- Antisocial Networks: A New Playground for Malware -- Dealing with an Infection -- Summary -- Endnotes -- ch. 8 Risk and Vulnerability Assessments -- Cyber Security and Risk Management -- Why Risk Management is the Foundation of Cyber Security -- What is Risk?"@en ;
    schema:description "Note continued: Still to Come -- Defending Against Modern Cyber Threats -- Insider Threats -- Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War -- Summary -- Endnotes -- ch. 4 Introduction to Industrial Control Systems and Operations -- System Assets -- Programmable Logic Controller -- Remote Terminal Unit -- Intelligent Electronic Device -- Human-Machine Interface -- Supervisory Workstations -- Data Historian -- Business Information Consoles and Dashboards -- Other Assets -- System Operations -- Control Loops -- Control Processes -- Feedback Loops -- Production Information Management -- Business Information Management -- Process Management -- Safety Instrumented Systems -- The Smart Grid -- Network Architectures -- Summary -- Endnotes -- ch. 5 Industrial Network Design and Architecture -- Introduction to Industrial Networking -- Common Topologies -- Network Segmentation -- Higher Layer Segmentation -- Physical vs. Logical Segmentation -- Network Services"@en ;
    schema:description "Note continued: Event Correlation -- Correlating Between IT and OT Systems -- Summary -- Endnotes -- ch. 12 Security Monitoring of Industrial Control Systems -- Determining what to Monitor -- Security Events -- Assets -- Configurations -- Applications -- Networks -- User Identities and Authentication -- Additional Context -- Behavior -- Successfully Monitoring Security Zones -- Log Collection -- Direct Monitoring -- Inferred Monitoring -- Information Collection and Management Tools -- Monitoring Across Secure Boundaries -- Information Management -- Queries -- Reports -- Alerts -- Incident Investigation and Response -- Log Storage and Retention -- Nonrepudiation -- Data Retention/Storage -- Data Availability -- Summary -- Endnotes -- ch. 13 Standards and Regulations -- Common Standards and Regulations -- NERC CIP -- CFATS -- ISO/TEC 27002 -- NRC Regulation 5.71 -- NIST SP 800-82 -- ISA/IEC-62443 -- ISA 62443 Group 1 "General""@en ;
    schema:description "Machine generated contents note: ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams and Figures -- The Smart Grid -- How This Book is Organized -- ch. 2 About Industrial Networks -- ch. 3 Industrial Cyber Security, History, and Trends -- ch. 4 Introduction to ICS and Operations -- ch. 5 ICS Network Design and Architecture -- ch. 6 Industrial Network Protocols -- ch. 7 Hacking Industrial Systems -- ch. 8 Risk and Vulnerability Assessments -- ch. 9 Establishing Zones and Conduits -- ch. 10 Implementing Security and Access Controls -- ch. 11 Exception, Anomaly, and Threat Detection -- ch. 12 Security Monitoring of Industrial Control Systems -- ch. 13 Standards and Regulations -- Changes Made to the Second Edition -- Conclusion -- ch. 2 About Industrial Networks -- The Use of Terminology Within This Book -- Attacks, Breaches, and Incidents: Malware, Exploits, and APTs -- Assets, Critical Assets, Cyber Assets, and Critical Cyber Assets"@en ;
    schema:description "This book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. It provides a thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Topics Include: all-new real-world examples of attacks against control systems, and more diagrams of systems; expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering. --"@en ;
    schema:description "Note continued: Wireless Networks -- Remote Access -- Performance Considerations -- Latency and Jitter -- Bandwidth and Throughput -- Type of Service, Class of Service, and Quality of Service -- Network Hops -- Network Security Controls -- Safety Instrumented Systems -- Special Considerations -- Wide Area Connectivity -- Smart Grid Network Considerations -- Advanced Metering Infrastructure -- Summary -- Endnotes -- ch. 6 Industrial Network Protocols -- Overview of Industrial Network Protocols -- Fieldbus Protocols -- Modicon Communication Bus -- Distributed Network Protocol -- Process Fieldbus -- Industrial Ethernet Protocols -- Ethernet Industrial Protocol -- PROFLNET -- EtherCAT -- Ethernet POWERLINK -- SERCOS III -- Backend Protocols -- Open Process Communications -- Inter-Control Center Communications Protocol -- Advanced Metering Infrastructure and the Smart Grid -- Security Concerns -- Security Recommendations -- Industrial Protocol Simulators -- Modbus"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/865549077> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/865549077#CreativeWork/industrial_network_security_securing_critical_infrastructure_networks_for_smart_grid_scada_and_other_industrial_control_systems> ;
    schema:name "Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems"@en ;
    schema:productID "900652416" ;
    schema:url <http://proquest.tech.safaribooksonline.de/9780124201149> ;
    schema:url <http://proquest.safaribooksonline.com/9780124201149> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=77754> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=9780124201149> ;
    schema:workExample <http://worldcat.org/isbn/9780124201149> ;
    schema:workExample <http://worldcat.org/isbn/9780124201842> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/900652416> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/865549077#Person/knapp_eric_d> # Eric D. Knapp
    a schema:Person ;
    schema:familyName "Knapp" ;
    schema:givenName "Eric D." ;
    schema:name "Eric D. Knapp" ;
    .

<http://experiment.worldcat.org/entity/work/data/865549077#Person/langill_joel_thomas> # Joel Thomas Langill
    a schema:Person ;
    schema:familyName "Langill" ;
    schema:givenName "Joel Thomas" ;
    schema:name "Joel Thomas Langill" ;
    .

<http://experiment.worldcat.org/entity/work/data/865549077#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/865549077#Topic/process_control_security_measures> # Process control--Security measures
    a schema:Intangible ;
    schema:name "Process control--Security measures"@en ;
    .

<http://worldcat.org/entity/work/data/865549077#CreativeWork/industrial_network_security_securing_critical_infrastructure_networks_for_smart_grid_scada_and_other_industrial_control_systems>
    a schema:CreativeWork ;
    rdfs:label "Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/900652416> ; # Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
    .

<http://worldcat.org/isbn/9780124201149>
    a schema:ProductModel ;
    schema:isbn "0124201148" ;
    schema:isbn "9780124201149" ;
    .

<http://worldcat.org/isbn/9780124201842>
    a schema:ProductModel ;
    schema:isbn "0124201849" ;
    schema:isbn "9780124201842" ;
    .

<http://www.worldcat.org/title/-/oclc/900652416>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/900652416> ; # Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
    schema:dateModified "2018-11-03" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.