Books > Reference & Interdisciplinary > Encyclopaedias & reference works > Reference works
|
Buy Now
Cybersecurity Lexicon (Paperback, 1st ed.)
Loot Price: R1,551
Discovery Miles 15 510
You Save: R139
(8%)
|
|
Cybersecurity Lexicon (Paperback, 1st ed.)
Expected to ship within 10 - 15 working days
|
Learn the threats and vulnerabilities of critical infrastructure to
cybersecurity attack. Definitions are provided for cybersecurity
technical terminology and hacker jargon related to automated
control systems common to buildings, utilities, and industry.
Buildings today are automated because the systems are complicated
and so we depend on the building controls system (BCS) to operate
the equipment. We also depend on a computerized maintenance
management system (CMMS) to keep a record of what was repaired and
to schedule required maintenance. SCADA, BCS, and CMMS all can be
hacked. The Cybersecurity Lexicon puts cyber jargon related to
building controls all in one place. The book is a handy desk
reference for professionals interested in preventing cyber-physical
attacks against their facilities in the real world. Discussion of
attacks on automated control systems is clouded by a lack of
standard definitions and a general misunderstanding about how bad
actors can actually employ cyber technology as a weapon in the real
world. This book covers: Concepts related to cyber-physical attacks
and building hacks are listed alphabetically with text easily
searchable by key phrase Definitions are providesd for technical
terms related to equipment controls common to industry, utilities,
and buildings-much of the terminology also applies to cybersecurity
in general What You'll learn Get a simple explanation of
cybersecurity attack concepts Quickly assess the threat of the most
common types of cybersecurity attacks to your facilities in real
time Find the definition of facilities, engineering, and
cybersecurity acronyms Who This Book Is For Architects, engineers,
building managers, students, researchers, and consultants
interested in cybersecurity attacks against facilities in the real
world. Also for IT professionals getting involved in cybersecurity
responsibilities.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.