Condizione: good. A well-loved companion. Corners and cover might show a little wear, and you could find some notes or highlights. The dust jacket might be MIA, it might have been a library book and extras aren't guaranteedâ"but the story's all there!
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
paperback. Condizione: Good. Mismanufactored, with the cover/ pages not cut properly. Causing the cover/ pages to be lager or smaller than the rest of the book.
paperback. Condizione: Very Good. Cover and edges may have some wear.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 44,19
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: McGraw-Hill Education 9/13/2016, 2016
ISBN 10: 1259589714 ISBN 13: 9781259589713
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions. Book.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 45,51
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: California Books, Miami, FL, U.S.A.
EUR 47,82
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 48,53
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 49,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: California Books, Miami, FL, U.S.A.
EUR 52,16
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Paperback. Condizione: new. Paperback. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking Exposed wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitatingand potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using ICS safe methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to: Assess your exposure and develop an effective risk management plan Adopt the latest ICS-focused threat intelligence techniques Use threat modeling to create realistic risk scenarios Implement a customized, low-impact ICS penetration-testing strategy See how attackers exploit industrial protocols Analyze and fortify ICS and SCADA devices and applications Discover and eliminate undisclosed zero-day vulnerabilities Detect, block, and analyze malware of all varieties Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Rarewaves USA, OSWEGO, IL, U.S.A.
EUR 57,78
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 50,30
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2024
ISBN 10: 1805124048 ISBN 13: 9781805124047
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 65,74
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 67,30
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Lingua: Inglese
Editore: Packt Publishing 3/29/2024, 2024
ISBN 10: 1805124048 ISBN 13: 9781805124047
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills. Book.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 51,47
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 56,01
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 56,67
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 57,80
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. pp. 544.
Da: Rarewaves USA United, OSWEGO, IL, U.S.A.
EUR 59,23
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2024
ISBN 10: 1805124048 ISBN 13: 9781805124047
Da: Rarewaves USA United, OSWEGO, IL, U.S.A.
EUR 62,59
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.
Da: moluna, Greven, Germania
EUR 62,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Packt Publishing Limited, GB, 2024
ISBN 10: 1805124048 ISBN 13: 9781805124047
Da: Rarewaves.com UK, London, Regno Unito
EUR 60,99
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.
Da: Rarewaves.com UK, London, Regno Unito
EUR 62,47
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 51,56
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 56,87
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 58,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.