EBOOK

About
This book explains the modern techniques required to protect a cyber-security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques.