Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

Techno Security's Guide to Securing SCADA : A Comprehensive Handbook On Protecting The Critical Infrastructure

By: Greg Miles Jack Wiles Ted Claypoole Phil Drake Paul A. Henry Lester J. Johnson Sean Lowther Marc Weber Tobias James H. Windle (Author)

Ksh 8,100.00
Format :

Format(s): DRM PDF

ISBN-13: 9780080569994

Publisher: Elsevier Science

Imprint: Syngress

Publication Date: August 23rd, 2008

Country of Publication: US

Language: English

Pages: 352

Physical Edition EAN: 9781597492829

More ebooks on Management of specific areas

  • Description

  • Author Bio

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more Companion Website featuring video interviews with subject matter experts offer a "e;sit-down"e; with the leaders in the field

Get Techno Security's Guide to Securing SCADA by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment


Digital Rights Management (DRM)

The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.


Required software

To read this ebook on a mobile device (phone or tablet) you'll need to install one of these free apps:



To download and read this eBook on a PC or Mac:


  • Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

More Ebooks by Greg Miles