Seller: medimops, Berlin, Germany
£ 17.79
Convert currencyQuantity: 1 available
Add to basketCondition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Published by Packt Publishing (edition 2nd ed.), 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BooksRun, Philadelphia, PA, U.S.A.
£ 25.60
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Good. 2nd ed. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Published by Liberties Journal August 2022, 2022
ISBN 10: 1735718777 ISBN 13: 9781735718774
Language: English
Seller: Inquiring Minds, Saugerties, NY, U.S.A.
£ 9.86
Convert currencyQuantity: 1 available
Add to basketTrade Paperback. Condition: Used - Very Good.
£ 7.60
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. New. Clean, unmarked pages. Fine binding and cover. Softcover.
Seller: Mooney's bookstore, Den Helder, Netherlands
£ 27.51
Convert currencyQuantity: 1 available
Add to basketCondition: Very good.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 410 pages. 9.17x7.56x1.06 inches. In Stock.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
£ 31.40
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.8.
Published by Liberties Journal Foundation, 2022
ISBN 10: 1735718777 ISBN 13: 9781735718774
Language: English
Seller: moluna, Greven, Germany
£ 22.10
Convert currencyQuantity: Over 20 available
Add to basketKartoniert / Broschiert. Condition: New. Über den AutorLeon Wieseltier is the editor of Liberties.Celeste Marcus is the managing editor of Liberties.Oksana Forostyna is a Ukrainian writer and transla.
£ 43.53
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 43.54
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 47.52
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 2021-10, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
£ 47.42
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 47.70
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: The Book Corner, Beaverton, OR, U.S.A.
£ 4.78
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Brand new. Ships from Friends bookstore to benefit Beaverton (Oregon) library.
£ 25.59
Convert currencyQuantity: 1 available
Add to basketCondition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 52.38
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: California Books, Miami, FL, U.S.A.
£ 46.34
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 10/7/2021, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
£ 45.91
Convert currencyQuantity: 1 available
Add to basketPaperback or Softback. Condition: New. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment 2.97. Book.
Published by Packt Publishing Limited, GB, 2023
ISBN 10: 1788395158 ISBN 13: 9781788395151
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
£ 54.21
Convert currencyQuantity: Over 20 available
Add to basketDigital. Condition: New. Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This Book. Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices. Filled with practical examples to help you secure critical infrastructure systems efficiently. A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systemsWho This Book Is ForIf you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn. Understand industrial cybersecurity, its control systems and operations. Design security-oriented architectures, network segmentation, and security support services. Configure event monitoring systems, anti-malware applications, and endpoint security. Gain knowledge of ICS risks, threat detection, and access management. Learn about patch management and life cycle management. Secure your industrial control systems from design through retirementIn DetailWith industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.Style and approachA step-by-step guide to implement Industrial Cyber Security effectively.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 41.99
Convert currencyQuantity: 1 available
Add to basketCondition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 44.12
Convert currencyQuantity: 1 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Best Price, Torrance, CA, U.S.A.
£ 37.18
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Seller: California Books, Miami, FL, U.S.A.
£ 52.42
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 10/18/2017, 2017
ISBN 10: 1788395158 ISBN 13: 9781788395151
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
£ 51.51
Convert currencyQuantity: 5 available
Add to basketPaperback or Softback. Condition: New. Industrial Cybersecurity 1.71. Book.
£ 47.34
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
£ 48
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Best Price, Torrance, CA, U.S.A.
£ 42.53
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Rarewaves USA United, OSWEGO, IL, U.S.A.
£ 63.51
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
£ 66.02
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.