Da: Indiana Book Company, Marion, IN, U.S.A.
Condizione: Good. Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available.
paperback. Condizione: New. New. Clean, unmarked pages. Fine binding and cover. Softcover.
Lingua: Inglese
Editore: Liberties Journal August 2022, 2022
ISBN 10: 1735718777 ISBN 13: 9781735718774
Da: Inquiring Minds, Saugerties, NY, U.S.A.
Trade Paperback. Condizione: Used - Very Good.
Da: Greenworld Books, Arlington, TX, U.S.A.
Condizione: good. Fast Free Shipping â" Good condition book with a firm cover and clean, readable pages. Shows normal use, including some light wear or limited notes highlighting, yet remains a dependable copy overall. Supplemental items like CDs or access codes may not be included.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: Goodbooks Company, Springdale, AR, U.S.A.
Condizione: acceptable. This copy may contain significant wear, including bending, heavy writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose pages. May not include access codes or CDs. May be an Ex library book with stickers and stamps. Dustjacket may be missing.
Condizione: New.
Lingua: Inglese
Editore: Packt Publishing 10/7/2021, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment. Book.
Condizione: New.
Da: The Book Corner, Beaverton, OR, U.S.A.
paperback. Condizione: New. Brand new. Ships from Friends bookstore to benefit Beaverton (Oregon) library.
Da: ZBK Books, Carlstadt, NJ, U.S.A.
Condizione: good. Fast & Free Shipping â" Good condition with a solid cover and clean pages. Shows normal signs of use such as light wear or a few marks highlighting, but overall a well-maintained copy ready to enjoy. Supplemental items like CDs or access codes may not be included.
Condizione: As New. Unread book in perfect condition.
Da: California Books, Miami, FL, U.S.A.
EUR 53,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Revaluation Books, Exeter, Regno Unito
EUR 40,43
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 410 pages. 9.17x7.56x1.06 inches. In Stock.
Condizione: New.
Lingua: Inglese
Editore: Packt Publishing 10/18/2017, 2017
ISBN 10: 1788395158 ISBN 13: 9781788395151
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Industrial Cybersecurity. Book.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New.
Condizione: As New. Unread book in perfect condition.
Condizione: New.
Da: California Books, Miami, FL, U.S.A.
EUR 60,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 50,00
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2023
ISBN 10: 1788395158 ISBN 13: 9781788395151
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 66,53
Quantità: Più di 20 disponibili
Aggiungi al carrelloDigital. Condizione: New. Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This Book. Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices. Filled with practical examples to help you secure critical infrastructure systems efficiently. A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systemsWho This Book Is ForIf you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn. Understand industrial cybersecurity, its control systems and operations. Design security-oriented architectures, network segmentation, and security support services. Configure event monitoring systems, anti-malware applications, and endpoint security. Gain knowledge of ICS risks, threat detection, and access management. Learn about patch management and life cycle management. Secure your industrial control systems from design through retirementIn DetailWith industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.Style and approachA step-by-step guide to implement Industrial Cyber Security effectively.
EUR 49,99
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 54,72
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 53,23
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 54,71
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Da: Rarewaves USA, OSWEGO, IL, U.S.A.
EUR 73,41
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.
EUR 56,07
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.