Chapter 1: Cyber-Physical Attack Recovery Procedures.- Chapter 2: Threats and Attack Detection.- Chapter 3: Prevent Hackers from Destroying a Boiler.- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel.- Chapter 5: Prevent Hackers from Destroying Chillers.- Chapter 6: Prevent Hackers...
prečítať celé
Chapter 1: Cyber-Physical Attack Recovery Procedures.- Chapter 2: Threats and Attack Detection.- Chapter 3: Prevent Hackers from Destroying a Boiler.- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel.- Chapter 5: Prevent Hackers from Destroying Chillers.- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train.- Chapter 7: Prevent Hackers from Destroying a Cooling Tower.- Chapter 8: Preventing Hackers from Destroying a Backup Generator.- Chapter 9: Prevent Hackers from Destroying Switchgear.- Chapter 10: Eight Steps to Defend Building Control Systems.- Chapter 11: Block Hacker Surveillance of your Buildings.- Chapter 12: Cyber-Physical Attack Recovery Procedures Template.-§§
Skryť popis
Recenzie