1 / 225
文档名称:

Applied Cyber Security and the Smart Grid - Implementing Security Controls into the Modern Power Infrastructure [2013] (9781597499989).pdf

格式:pdf   页数:225
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Applied Cyber Security and the Smart Grid - Implementing Security Controls into the Modern Power Infrastructure [2013] (9781597499989).pdf

上传人:bolee65 2014/7/18 文件大小:0 KB

下载得到文件列表

Applied Cyber Security and the Smart Grid - Implementing Security Controls into the Modern Power Infrastructure [2013] (9781597499989).pdf

文档介绍

文档介绍:Applied Cyber
Security and the
Smart Grid
This page is intentionally left blank
Applied Cyber
Security and the
Smart Grid
Implementing Security
Controls into the Modern
Power Infrastructure
Eric D. Knapp
Raj Samani
Joel Langill, Technical Editor
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an Imprint of Elsevier
Acquiring Editor: Chris Katsaropoulos
Editorial Project Manager: Benjamin Rearick
Project Manager: Punithavathy Govindaradjane
Designer: Matthew Limbert
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright © 2013 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or any information storage
and retrieval system, without permission in writing from the publisher. Details on how to
seek permission, further information about the Publisher’s permissions policies and our
arrangements anizations such as the Copyright Clearance Center and the Copyright
Licensing Agency, can be found at our website: missions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experi-
ence broaden our understanding, changes in research methods or professional practices, may
e necessary. Practitioners and researchers must always rely on their own experience and
knowledge in evaluating and using any information or methods described herein. In using such
information or methods they should be mindful of their own safety and the safety of others,
including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contr