-
2
-
-
84899161240
-
-
Control Microsystems, Retrieved December 1, 2009, from
-
Control Microsystems. (2009). DNP and IEC 60870-5 Compliance FAQ. Retrieved December 1, 2009, from http://controlmicrosystems.com/resources-2/downloads/dnp3-iec-60870-5-compliance/
-
(2009)
DNP and IEC 60870-5 Compliance FAQ
-
-
-
4
-
-
84899375930
-
-
DNP Users Group, Retrieved March 20, 2005, from, [REMOVED HYPERLINK FIELD]
-
DNP Users Group. (2005). DNP3 primary. Retrieved March 20, 2005, from [REMOVED HYPERLINK FIELD]http://www.dnp.org/About/DNP3%20Primer%20Rev%20A.pdf
-
(2005)
DNP3 Primary
-
-
-
9
-
-
84899176999
-
-
Retrieved December 13, 2009, from
-
Mackiewicz, R. (2008). Benefits of IEC 61850 networking, marketing subcommittee chair, UCA international users group, SISCO, Inc. (2008). Retrieved December 13, 2009, from http://www.SISCOnet.com/
-
(2008)
Benefits of IEC 61850 Networking, Marketing Subcommittee Chair, UCA International Users Group, SISCO, Inc. (2008)
-
-
Mackiewicz, R.1
-
10
-
-
84899223235
-
-
Retrieved November 29, 2007, from
-
McMillan, R. (2007). Insider charged with hacking California canal system. Retrieved November 29, 2007, from http://www.computerworld.com/s/article/9050098/Insider_charged_with_hacking_California_canal_system?taxonomyName=storage
-
(2007)
Insider Charged with Hacking California Canal System
-
-
McMillan, R.1
-
11
-
-
20644463278
-
Making the nation safer: The role of science and technology in countering terrorism
-
National Research Council, Retrieved 2002 from
-
National Research Council. (2002). Making the nation safer: the role of science and technology in countering terrorism, Report from the Committee on Science and Technology for Countering Terrorism. Retrieved 2002 from http://www.nap.edu/openbook.php?record_id=10415&page=R1
-
(2002)
Report from the Committee on Science and Technology for Countering Terrorism
-
-
-
13
-
-
79956004912
-
-
Retrieved October 30, 2006, from
-
Ross, B. (2006). Hackers penetrate water system computers. Retrieved October 30, 2006, from http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra.html
-
(2006)
Hackers Penetrate Water System Computers
-
-
Ross, B.1
-
14
-
-
84899356317
-
-
January 20, 2004, from
-
Shea, D. (2003). Resources, Science and Industry Division; The Library of Congress, CRS Report for Congress, Critical Infrastructure: Control Systems and the Terrorist Threat, CRS-RL31534. January 20, 2004, from: http://www.fas.org/sgp/crs/homesec/RL31534.pdf
-
(2003)
Resources, Science and Industry Division; the Library of Congress, CRS Report for Congress, Critical Infrastructure: Control Systems and the Terrorist Threat, CRS-RL31534
-
-
Shea, D.1
-
16
-
-
0344559509
-
-
The White House, Retrieved February 2003, from
-
The White House. (2003). The National Strategy to Secure Cyberspace. Retrieved February 2003, from http://georgewbush-whitehouse.archives.gov/pcipb/cyberspace_strategy.pdf
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
18
-
-
84899224200
-
-
U.S. Computer Emergency Response Team (USCERT), Retrieved 2008 from
-
U.S. Computer Emergency Response Team (USCERT). (2008). FAQ about the Control Systems Security Program (CSSP). Retrieved 2008 from http://www.us-cert.gov/control_systems/csfaq.html
-
(2008)
FAQ About the Control Systems Security Program (CSSP)
-
-
-
25
-
-
84899346752
-
-
Utility Consulting International (UCI), Retrieved 2009 from
-
Utility Consulting International (UCI). (2009). Development of security standards for DNP, ICCP and IEC 61850 FAQ. Retrieved 2009 from http://www.uci-usa.com/Projects/pr_List/Systems/CyberSecurity/Standards.html
-
(2009)
Development of Security Standards for DNP, ICCP and IEC 61850 FAQ
-
-
|