paperback. Zustand: New. New. Clean, unmarked pages. Fine binding and cover. Softcover.
Anbieter: The Book Corner, Beaverton, OR, USA
paperback. Zustand: New. Brand new. Ships from Friends bookstore to benefit Beaverton (Oregon) library.
Sprache: Englisch
Verlag: Liberties Journal August 2022, 2022
ISBN 10: 1735718777 ISBN 13: 9781735718774
Anbieter: Inquiring Minds, Saugerties, NY, USA
Trade Paperback. Zustand: Used - Very Good.
Anbieter: Greenworld Books, Arlington, TX, USA
Zustand: good. Fast Free Shipping â" Good condition book with a firm cover and clean, readable pages. Shows normal use, including some light wear or limited notes highlighting, yet remains a dependable copy overall. Supplemental items like CDs or access codes may not be included.
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: Goodbooks Company, Springdale, AR, USA
Zustand: acceptable. This book is in acceptable condition and may have highlighting and or writing throughout. The actual cover image may not match the stock photo. Book may show internal and or external wear on spine or cover and may be slightly skewed or have creased pages. This is a used book so codes may be invalid or accompanying media may be missing. May be an Ex library book with stickers and stamps. Dustjacket may be missing or damaged.
Zustand: New.
Sprache: Englisch
Verlag: Packt Publishing 10/7/2021, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Anbieter: BargainBookStores, Grand Rapids, MI, USA
Paperback or Softback. Zustand: New. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment. Book.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 47,75
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Indiana Book Company, Marion, IN, USA
Zustand: Good. Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available.
Anbieter: ZBK Books, Carlstadt, NJ, USA
Zustand: good. Fast & Free Shipping â" Good condition with a solid cover and clean pages. Shows normal signs of use such as light wear or a few marks highlighting, but overall a well-maintained copy ready to enjoy. Supplemental items like CDs or access codes may not be included.
Zustand: As New. Unread book in perfect condition.
Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 40,42
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 410 pages. 9.17x7.56x1.06 inches. In Stock.
EUR 54,17
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Packt Publishing 10/18/2017, 2017
ISBN 10: 1788395158 ISBN 13: 9781788395151
Anbieter: BargainBookStores, Grand Rapids, MI, USA
Paperback or Softback. Zustand: New. Industrial Cybersecurity. Book.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 53,52
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 55,03
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Zustand: New.
Anbieter: California Books, Miami, FL, USA
Zustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 49,99
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Packt Publishing Limited, GB, 2023
ISBN 10: 1788395158 ISBN 13: 9781788395151
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 66,69
Anzahl: Mehr als 20 verfügbar
In den WarenkorbDigital. Zustand: New. Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This Book. Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices. Filled with practical examples to help you secure critical infrastructure systems efficiently. A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systemsWho This Book Is ForIf you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn. Understand industrial cybersecurity, its control systems and operations. Design security-oriented architectures, network segmentation, and security support services. Configure event monitoring systems, anti-malware applications, and endpoint security. Gain knowledge of ICS risks, threat detection, and access management. Learn about patch management and life cycle management. Secure your industrial control systems from design through retirementIn DetailWith industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.Style and approachA step-by-step guide to implement Industrial Cyber Security effectively.
EUR 49,98
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Zustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 54,72
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
EUR 53,23
Anzahl: 10 verfügbar
In den WarenkorbPF. Zustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 54,71
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Packt Publishing Limited, GB, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Anbieter: Rarewaves USA, OSWEGO, IL, USA
Paperback. Zustand: New. A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.
EUR 56,30
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.