Seller: The Book Corner, Beaverton, OR, U.S.A.
paperback. Condition: New. Brand new. Ships from Friends bookstore to benefit Beaverton (Oregon) library.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
paperback. Condition: New. New. Clean, unmarked pages. Fine binding and cover. Softcover.
Published by Liberties Journal August 2022, 2022
ISBN 10: 1735718777 ISBN 13: 9781735718774
Language: English
Seller: Inquiring Minds, Saugerties, NY, U.S.A.
Trade Paperback. Condition: Used - Very Good.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Published by Packt Publishing (edition 2nd ed.), 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Good. 2nd ed. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.8.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 54.45
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 10/7/2021, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment 2.97. Book.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
US$ 61.31
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING.
Seller: Mooney's bookstore, Den Helder, Netherlands
US$ 37.22
Convert currencyQuantity: 1 available
Add to basketCondition: Very good.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 61.03
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
US$ 63.00
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by Packt Publishing 10/18/2017, 2017
ISBN 10: 1788395158 ISBN 13: 9781788395151
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Industrial Cybersecurity 1.71. Book.
Condition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 60.52
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: medimops, Berlin, Germany
US$ 24.07
Convert currencyQuantity: 1 available
Add to basketCondition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Condition: New.
Published by Packt Publishing Limited, GB, 2023
ISBN 10: 1788395158 ISBN 13: 9781788395151
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
US$ 78.66
Convert currencyQuantity: Over 20 available
Add to basketDigital. Condition: New. Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This Book. Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices. Filled with practical examples to help you secure critical infrastructure systems efficiently. A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systemsWho This Book Is ForIf you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn. Understand industrial cybersecurity, its control systems and operations. Design security-oriented architectures, network segmentation, and security support services. Configure event monitoring systems, anti-malware applications, and endpoint security. Gain knowledge of ICS risks, threat detection, and access management. Learn about patch management and life cycle management. Secure your industrial control systems from design through retirementIn DetailWith industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.Style and approachA step-by-step guide to implement Industrial Cyber Security effectively.
US$ 60.50
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 47.54
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Brand New. 410 pages. 9.17x7.56x1.06 inches. In Stock.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 66.29
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Published by Packt Publishing 2021-10, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 62.59
Convert currencyQuantity: 10 available
Add to basketPF. Condition: New.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New. A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.