SCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. qCybersecurity for SCADA Systemsq provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.RTUs normally come with at least one serial port, through which the SCADA host communicates with the RTU. This serial port is ... Initially, this meant placing two separate RTUs at the same location and wiring the same inputs to both units.
|Title||:||Cybersecurity for SCADA Systems|
|Author||:||William T. Shaw|
|Publisher||:||PennWell Books - 2006|