Seller: Goodbooks Company, Springdale, AR, U.S.A.
Condition: acceptable. This copy may contain significant wear, including bending, heavy writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose pages. May not include access codes or CDs. May be an Ex library book with stickers and stamps. Dustjacket may be missing.
Published by Packt Publishing (edition 2nd ed.), 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Good. 2nd ed. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Published by Packt Publishing 10/7/2021, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment 2.97. Book.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 54.45
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 65.87
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Published by Packt Publishing 2021-10, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 62.20
Convert currencyQuantity: 10 available
Add to basketPF. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 65.63
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 72.36
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by Packt Publishing Limited, 2021
ISBN 10: 1800202091 ISBN 13: 9781800202092
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 73.02
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 100.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 100.04
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next levelKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.Table of ContentsIntroduction and Recap of First EditionA Modern Look at the Industrial Control System ArchitectureThe Industrial Demilitarized ZoneDesigning the ICS Architecture with Security in MindIntroduction to Security MonitoringPassive Security MonitoringActive Security MonitoringIndustrial Threat IntelligenceVisualizing, Correlating, and AlertingThreat HuntingThreat Hunt Scenario 1 - Malware BeaconingThreat Hunt Scenario 2 - Finding Malware and Unwanted ApplicationsThreat Hunt Scenario 3 - Suspicious External ConnectionsDifferent Types of Cybersecurity AssessmentsIndustrial Control System Risk AssessmentsRed Team/Blue Team ExercisesPenetration Testing ICS EnvironmentsIncident Response for the ICS EnvironmentLab Setup.