Enclosed is the table of contents for the book.
Table of Contents
PrefaceChapter 1 BackgroundChapter 2 DefinitionsChapter 3 ICS descriptionsChapter 4 Convergence between ICS and ITChapter 5 Differences between ICS and ITChapter 6 Electronic threats to ICSsChapter 7 MythsChapter 8 Current personnel status and needsChapter 9 Information sharing and disclosuresChapter 10 Risk assessment for ICSChapter 11 Selected industry activitiesChapter 12 ICS security trends and observationsChapter 13 ICS cyber security demonstrationsChapter 14 Selected case histories – Malicious attacksChapter 15 Selected case histories – Unintentional incidents Chapter 16 ICS incident categorizationChapter 17 RecommendationsAppendix 1 AcronymsAppendix 2 Definitions Appendix 3 Comparison of key definitionsAppendix 4 CSIS White PaperAppendix 5 Selected References
Joe Weiss
Leaders relevant to this article: