Anbieter: Goodwill of Colorado, COLORADO SPRINGS, CO, USA
EUR 15,12
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: good. This item is in overall good condition. Covers and dust jackets are intact but may have minor wear including slight curls or bends to corners as well as cosmetic blemishes including stickers. Pages are intact but may have minor highlighting writing. Binding is intact; however, spine may have slight wear overall. Digital codes may not be included and have not been tested to be redeemable and or active. Minor shelf wear overall. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you!
EUR 19,05
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 43,32
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Packt Publishing 6/17/2022, 2022
ISBN 10: 1801814686 ISBN 13: 9781801814683
Sprache: Englisch
Anbieter: BargainBookStores, Grand Rapids, MI, USA
EUR 45,67
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbPaperback or Softback. Zustand: New. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs 1.73. Book.
Anbieter: California Books, Miami, FL, USA
EUR 45,95
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 44,73
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 47,18
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 48,16
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Verlag: McGraw-Hill Education, US, 2016
ISBN 10: 1259589714 ISBN 13: 9781259589713
Sprache: Englisch
Anbieter: Rarewaves USA, OSWEGO, IL, USA
EUR 58,72
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 45,29
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
EUR 43,31
Währung umrechnenAnzahl: 10 verfügbar
In den WarenkorbPF. Zustand: New.
Verlag: Packt Publishing Limited, GB, 2022
ISBN 10: 1801814686 ISBN 13: 9781801814683
Sprache: Englisch
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 63,52
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey FeaturesDevelop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence, collection, and analysis using open-source toolsLeverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programsBook DescriptionWe're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.What you will learnDiscover types of threat actors and their common tactics and techniquesUnderstand the core tenets of cyber threat intelligenceDiscover cyber threat intelligence policies, procedures, and frameworksExplore the fundamentals relating to collecting cyber threat intelligenceUnderstand fundamentals about threat intelligence enrichment and analysisUnderstand what threat hunting and pivoting are, along with examplesFocus on putting threat intelligence into productionExplore techniques for performing threat analysis, pivoting, and huntingWho this book is forThis book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 45,28
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 51,08
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Verlag: McGraw-Hill Education, US, 2016
ISBN 10: 1259589714 ISBN 13: 9781259589713
Sprache: Englisch
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 69,56
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 54,69
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 57,48
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New.
Anbieter: London Bridge Books, London, Vereinigtes Königreich
EUR 45,22
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Good.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 70,09
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: New. New. book.
Verlag: McGraw-Hill Education, US, 2016
ISBN 10: 1259589714 ISBN 13: 9781259589713
Sprache: Englisch
Anbieter: Rarewaves USA United, OSWEGO, IL, USA
EUR 60,68
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Verlag: Packt Publishing Limited, GB, 2022
ISBN 10: 1801814686 ISBN 13: 9781801814683
Sprache: Englisch
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 58,73
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey FeaturesDevelop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence, collection, and analysis using open-source toolsLeverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programsBook DescriptionWe're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.What you will learnDiscover types of threat actors and their common tactics and techniquesUnderstand the core tenets of cyber threat intelligenceDiscover cyber threat intelligence policies, procedures, and frameworksExplore the fundamentals relating to collecting cyber threat intelligenceUnderstand fundamentals about threat intelligence enrichment and analysisUnderstand what threat hunting and pivoting are, along with examplesFocus on putting threat intelligence into productionExplore techniques for performing threat analysis, pivoting, and huntingWho this book is forThis book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.
Verlag: McGraw-Hill Education, US, 2016
ISBN 10: 1259589714 ISBN 13: 9781259589713
Sprache: Englisch
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 64,46
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking ExposedT wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.Learn how to:. Assess your exposure and develop an effective risk management plan. Adopt the latest ICS-focused threat intelligence techniques. Use threat modeling to create realistic risk scenarios. Implement a customized, low-impact ICS penetration-testing strategy. See how attackers exploit industrial protocols. Analyze and fortify ICS and SCADA devices and applications. Discover and eliminate undisclosed "zero-day" vulnerabilities. Detect, block, and analyze malware of all varieties.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 47,47
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: PBShop.store US, Wood Dale, IL, USA
EUR 53,18
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 52,45
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 100.
Verlag: Packt Publishing, Limited, 2022
ISBN 10: 1801814686 ISBN 13: 9781801814683
Sprache: Englisch
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 54,58
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 460.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 81,11
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 416 pages. 8.75x7.25x0.75 inches. In Stock. This item is printed on demand.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 66,79
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program Key Features:Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs Book Description: We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas - defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open-source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and have understood what it takes to operationalize your own threat intelligence function, from collection to production. What You Will Learn:Discover types of threat actors and their common tactics and techniques Understand the core tenets of cyber threat intelligence Discover cyber threat intelligence policies, procedures, and frameworks Explore the fundamentals relating to collecting cyber threat intelligence Understand fundamentals about threat intelligence enrichment and analysis Understand what threat hunting and pivoting are, along with examples Focus on putting threat intelligence into production Explore techniques for performing threat analysis, pivoting, and hunting Who this book is for: This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.