skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Cybersécurité des Installations Industrielles Preview this item
ClosePreview this item
Checking...

Cybersécurité des Installations Industrielles

Author: édéric Guyomard; Stéphane Meynet
Publisher: TOULOUSE : Cepadues Editions, 2015.
Edition/Format:   eBook : Document : French
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Guyomard, édéric.
Cybersécurité des Installations Industrielles.
TOULOUSE : Cepadues Editions, ©2015
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: édéric Guyomard; Stéphane Meynet
ISBN: 9782364934788 2364934788
OCLC Number: 1088353340
Description: 1 online resource (25 pages)
Contents: Intro; SOMMAIRE; Chapitre XVI; Certifications de cybersécurité : Panorama, intérêts et limites pour les systèmes numériques industriels; 1. Introduction; 2. Définition; 3. Objectifs; 4. Référentiels de certification; 4.1 Contexte des systèmes industriels; 4.2 Les certifications " Sécurité Fonctionnelle "; 5. Intérêt des certifications de cybersécurité pour les systèmes numériques industriels; 6. Les certifications de cybersécurité pour les produits; 6.1 Les certifications ACHILLES; 6.2 Les certifications ISASecure; 6.3 Les Critères Communs; 6.4 Certification de Sécurité de Premier Niveau 7. Les limites des certifications de produits8. D'autres types de certifications; 8.1 Certification des intervenants; 8.2 Certification des entreprises; 9. De nouveaux schémas de certifications à créer?; 9.1 Réflexion pour les produits; 9.2 Réflexion pour les intervenants; 9.3 Réflexion pour les systèmes ; 10. Dualité cyber vs sûreté : objectif convergence; 11. Conclusion

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1088353340<\/a>> # Cybers\u00E9curit\u00E9 des Installations Industrielles<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1088353340<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/fr<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Place\/toulouse<\/a>> ; # TOULOUSE<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/658\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Topic\/industrial_management<\/a>> ; # Industrial management<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Person\/meynet_stephane<\/a>> ; # St\u00E9phane Meynet<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Person\/guyomard_ederic<\/a>> ; # \u00E9d\u00E9ric Guyomard<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2015<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Intro; SOMMAIRE; Chapitre XVI; Certifications de cybers\u00E9curit\u00E9 : Panorama, int\u00E9r\u00EAts et limites pour les syst\u00E8mes num\u00E9riques industriels; 1. Introduction; 2. D\u00E9finition; 3. Objectifs; 4. R\u00E9f\u00E9rentiels de certification; 4.1 Contexte des syst\u00E8mes industriels; 4.2 Les certifications \" S\u00E9curit\u00E9 Fonctionnelle \"; 5. Int\u00E9r\u00EAt des certifications de cybers\u00E9curit\u00E9 pour les syst\u00E8mes num\u00E9riques industriels; 6. Les certifications de cybers\u00E9curit\u00E9 pour les produits; 6.1 Les certifications ACHILLES; 6.2 Les certifications ISASecure; 6.3 Les Crit\u00E8res Communs; 6.4 Certification de S\u00E9curit\u00E9 de Premier Niveau<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/8943834142<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\" ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"fr<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/8943834142#CreativeWork\/cybersecurite_des_installations_industrielles<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cybers\u00E9curit\u00E9 des Installations Industrielles<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1088353340<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1088353340#PublicationEvent\/toulouse_cepadues_editions_2015<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Agent\/cepadues_editions<\/a>> ; # Cepadues Editions<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5709848<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9782364934788<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1088353340<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/658\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Agent\/cepadues_editions<\/a>> # Cepadues Editions<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cepadues Editions<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Person\/guyomard_ederic<\/a>> # \u00E9d\u00E9ric Guyomard<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Guyomard<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"\u00E9d\u00E9ric<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"\u00E9d\u00E9ric Guyomard<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Person\/meynet_stephane<\/a>> # St\u00E9phane Meynet<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Meynet<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"St\u00E9phane<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"St\u00E9phane Meynet<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Place\/toulouse<\/a>> # TOULOUSE<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TOULOUSE<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Topic\/industrial_management<\/a>> # Industrial management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Industrial management<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/fr<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"fr<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/8943834142#CreativeWork\/cybersecurite_des_installations_industrielles<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Cybers\u00E9curit\u00E9 des Installations Industrielles.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1088353340<\/a>> ; # Cybers\u00E9curit\u00E9 des Installations Industrielles<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9782364934788<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"2364934788<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9782364934788<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1088353340<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1088353340<\/a>> ; # Cybers\u00E9curit\u00E9 des Installations Industrielles<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-02-07<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1088353340#PublicationEvent\/toulouse_cepadues_editions_2015<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Place\/toulouse<\/a>> ; # TOULOUSE<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8943834142#Agent\/cepadues_editions<\/a>> ; # Cepadues Editions<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2015<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n