Enclosed is the table of contents for the book.
Table of Contents
Preface
Chapter 1 Ā Background
Chapter 2 Ā Definitions
Chapter 3 Ā ICS descriptions
Chapter 4 Ā Convergence between ICS and IT
Chapter 5 Ā Differences between ICS and IT
Chapter 6Ā Electronic threats to ICSs
Chapter 7 Ā Myths
Chapter 8Ā Current personnel status and needs
Chapter 9 Ā Information sharing and disclosures
Chapter 10 Ā Risk assessment for ICS
Chapter 11 Ā Selected industry activities
Chapter 12 Ā ICS security trends and observations
Chapter 13Ā ICS cyber security demonstrations
Chapter 14Ā Selected case histories ā Malicious attacks
Chapter 15Ā Selected case histories ā Unintentional incidents
Chapter 16Ā ICS incident categorization
Chapter 17 Ā Recommendations
Appendix 1 Ā Acronyms
Appendix 2 Ā Definitions
Appendix 3 Ā Comparison of key definitions
Appendix 4 Ā CSIS White Paper
Appendix 5 Ā Selected References
Joe Weiss
About the Author
jweiss
jweiss

Leaders relevant to this article: