Receive our CYBERSECURITY newsletter! Subscribe.
Data Security Weekly – Finding the most important highlights from the most recent week, so that if you don’t have time read through other magazines and newspapers, you won’t miss out on something of which you should be aware.
InformationWeek DARKReading – Dark Reading.com encompasses ten communities, each of which drills deeper into the enterprise security challenge: Attacks & Breaches, Application Security, Cloud Security, Data Leaks & Insider Threats, Endpoint Security & Privacy, Mobile Security, Network & Perimeter Security, Risk Management & Compliance, Security Management & Analytics, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.
NATIONAL SECURITY INSTITUTE – Leader in security awareness for security professionals
TechTarget-Security – Free resources for technology professionals
Inside the NSA’s plan to lure cyber talent – Federal Times article: “We need lots of talent, and that talent needs to be diverse and reflect who we are as a country,” said Diane Janosek, the commandant of the NSA’s National Cryptologic School.
Framework for SCADA Cybersecurity
By Stephen Miller and Richard H. Clark
Revision A-01.19.2015, Smashwords Edition: https://www.smashwords.com/books/view/510004
License Notes: This ebook is available free of charge or for a minimal cost, depending on the requirements of the local ebook distributor or publisher. Portions or sections of this book may be copied, distributed, reposted, reprinted, or shared as required or needed; simply by including the acknowledgement of the origins of those used or redistributed materials.
eBook ISBN: 978-1310-30996-0
Copyright 2014 InduSoft, Inc., a Schneider Electric company. All rights reserved. All trademarks are owned by Schneider Electric Industries SAS or its affiliated companies or their respective owners.
Permission is hereby given to Eastern New Mexico University by InduSoft, Inc. to incorporate and reprint copyrighted materials contained in this eBook, including “Chapter 5: InduSoft Security Guide”.
This ebook contains original content and materials created by the authors, as well as some materials designated as “public domain” or “freely distributable” as described within the associated footnotes. The ebook does not contain any known copyrighted information. Copyright violations should be reported to: InduSoft, Inc., 11044 Research Blvd., Suite A100, Austin, TX 78759 U.S.A, or by email at info@indusoft.com, and every effort will be made to make corrections in subsequent revisions and editions.
Further information about selected subjects within this ebook is available from the website at www.indusoft.com and the designated references in Appendix C.
All profits from this ebook are to be directed and donated to the Eastern New Mexico University-Ruidoso Foundation, as noted below.
If you find this ebook useful in your business, tax deductible donations to the university 501(c)(3) foundation are encouraged by contacting:
ENMU-Ruidoso Foundation
Rochelle Lentschke, Director
709 Mechem Drive · Ruidoso, NM 88345
575-315-1216
The mission of the ENMU-Ruidoso Foundation is to acquire private, philanthropic support to assist in creating educational opportunities at Eastern New Mexico University’s branch community college in Ruidoso.
The vision of ENMU-Ruidoso Foundation is to generate support from individuals, corporations, and foundations to assist the college in fulfilling its far-reaching mission of optimizing the growth and development of its student community.