Mohammad Ashiqur Rahman: Securing Industrial Control Systems, Kartoniert / Broschiert
Securing Industrial Control Systems
- Advanced Strategies and Technologies
(soweit verfügbar beim Lieferanten)
- Verlag:
- Springer, 01/2026
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032030177
- Artikelnummer:
- 12636198
- Umfang:
- 564 Seiten
- Gewicht:
- 844 g
- Maße:
- 235 x 155 mm
- Stärke:
- 31 mm
- Erscheinungstermin:
- 22.1.2026
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Klappentext
Comprehensive Overview of Industrial Control Systems (ICS): Evolution, Components, and Security Challenges
SCADA Systems in Industrial Control: Cloud Connectivity, Security Protocols, and Architectural Design
Understanding Communication and Protocols in ICS: Securing Network Infrastructure and Data Exchange
Exploring Industrial Automation Systems: Security Strategies, Optimization of Control Mechanisms, and AI Integration
Mitigating the ICS Attack Surface: Identifying Attack Vectors, Reducing Vulnerabilities, and Security Mapping Techniques
Network Segmentation in Industrial Operations: Enhancing ICS Security through Threat Mitigation and DNS Leak Prevention
Comprehensive Overview of Field Devices in ICS: Protocol Management, Security Challenges, and Lifecycle Optimization
Supervisory Systems Security Threats Part-1: Legacy SCADA Vulnerabilities, Communication Protocols, and System Security Strategies
Supervisory Systems Security Threats Part-2: Assessing Sectoral Risks, Insider Threats, and Human-Centric Security Solutions
Controller Security Threats: Mitigating Advanced Persistent Threats (APTs), Enhancing Authentication, and Securing Control Architectures
ICS Cyber Resilience Part-1: AI and Machine Learning Strategies, System Hygiene Practices, and Secure Smart Grid Frameworks
ICS Attack Resiliency Analysis Part-2: Advanced Incident Response, Threat Intelligence, and Cyber-Physical Systems Monitoring
ICS Security Requirements: Cybersecurity Frameworks, Incident Response Strategies, and IoT Device Compliance
Static Defense Strategies for ICS: Prioritizing Patch Management, Defense-in-Depth Approaches, and Regulatory Compliance
Intrusion Detection Systems (IDS) in ICS: Supervisory Frameworks, Signature vs Anomaly-Based Detection, and Architectural Design
Attack Recovery Mechanisms for ICSs: Common Cyber Attacks, Cryptographic Key Management, and Host-Based Mitigation Strategies
Case studies: Industrial Control Systems Security Challenges and Mitigations