Applied cyber security and the smart grid implementing security controls into the modern power infrastructure /

"Understanding how the Smart Grid works first requires an understanding of how industrial networks operate, which in turn requires a basic understanding of the underlying communications protocols that are used, where they are used, and why. There are many systems that comprise the larger system...

Whakaahuatanga katoa

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Knapp, Eric D.
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Samani, Raj, Langill, Joel
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Amsterdam ; Boston : Elsevier/Syngress, 2013.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.