{"id":14804,"date":"2018-05-15T14:00:54","date_gmt":"2018-05-15T17:00:54","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=14804"},"modified":"2018-05-15T11:49:00","modified_gmt":"2018-05-15T14:49:00","slug":"protecting-industrial-control-systems-from-electronic-threats","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/protecting-industrial-control-systems-from-electronic-threats\/","title":{"rendered":"Protecting Industrial Control Systems from Electronic Threats"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-14805\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/05\/protecting-industrial-control-systems-from-electronic-threats.jpg\" alt=\"Protecting Industrial Control Systems from Electronic Threats\" width=\"145\" height=\"189\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/05\/protecting-industrial-control-systems-from-electronic-threats.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2018\/05\/protecting-industrial-control-systems-from-electronic-threats-115x150.jpg 115w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Joseph Weiss<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Publisher Momentum Press<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and &#8216;SCADA security&#8217; (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs)-and all the other, field controllers, sensors, and drives, emission controls, and that make up the &#8216;intelligence&#8217; of modern industrial buildings and facilities. This book will help the reader better understand what is industrial control system cyber security, why is it different than IT security, what has really happened to date, and what needs to be done. Loads of practical advice is offered on everything from clarity on current cyber-security systems and how they can be integrated into general IT systems, to how to conduct risk assessments and how to obtain certifications, to future trends in legislative and regulatory issues affecting industrial security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joseph Weiss Publisher Momentum Press Overview: Aimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and &#8216;SCADA security&#8217; (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote&hellip; <\/p>\n","protected":false},"author":3,"featured_media":14805,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,22,51],"tags":[],"class_list":["post-14804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-seguranca-eletronica","category-english"],"views":502,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/14804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=14804"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/14804\/revisions"}],"predecessor-version":[{"id":14806,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/14804\/revisions\/14806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/14805"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=14804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=14804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=14804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}