×
ورود

کتاب Industrial Cybersecurity, 2nd Edition

70% در صد از خریداران ، این کالا را پسندیدند
ویژگی های محصول
  • تعداد صفحه: 800
  • زبان:انگلیسی
  • ویرایش دوم
  • تاریخ انتشار:October 7, 2021

شما هم فروشنده شوید

  • تاریخ عضویت:1399-12-10
  • استان: آذربایجان شرقی
  • شهر: تبریز
  • تعداد کالای فروشنده: 3566
  • موجودی این کالا: 10
قیمت
675,000 تومان
افزودن به سبد خرید
ویژگی های محصول
  • وزن: 1347 گرم
  • سایز: 19*4.6*23.5
  • جنس: کتاب
  • دوام: کیفیت چاپ بالا
توضیحات

ارسال کتاب های زبان اصلی در بازه 8 الی 12 روزه انجام میشود.
------------------------------------------------------------------------------------------
https://www.amazon.com/Industrial-Cybersecurity-Efficiently-cybersecurity-environment/dp/1800202091
===========================================================================
Industrial Cybersecurity, 2nd Edition

by Pascal Ackerman (Author)
Key Features
Architect, design, and build ICS networks with security in mind
Perform a variety of security assessments, checks, and verifications
Ensure that your security processes are effective, complete, and relevant
Book Description
With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.

You’ll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You’ll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you’ll work with incident response and incident recovery tools and techniques in an ICS environment.

برای ثبت نظر جدید ابتدا باید وارد شوید ورود به تا بینهایت

محصولات مرتبط

محصولات دیگر این فروشنده

  • تاریخ عضویت:1399-12-10
  • استان: آذربایجان شرقی
  • شهر: تبریز
  • تعداد کالای فروشنده: 3566
  • موجودی این کالا: 10
قیمت
675,000 تومان
افزودن به سبد خرید
خانه چت آنلاین ورود یا ثبت نام سبد خرید