Industrial cybersecurity (Record no. 1034)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01526cam a2200241 i 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231126n2021 af 000 0 eng u |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781800202092 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Sirsi) a3073 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | <a href="005.82">005.82</a> |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ackerman, Pascal |
Relator term | , author |
9 (RLIN) | 3400 |
245 10 - TITLE STATEMENT | |
Title | Industrial cybersecurity |
Remainder of title | : efficiently monitor the cybersecurity posture of your ICS environment |
Statement of responsibility, etc. | / Pascal Ackerman. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Birmingham : |
Name of producer, publisher, distributor, manufacturer | Packt Publishing |
Date of production, publication, distribution, manufacture, or copyright notice | , 2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xx, 779 pages : |
Other physical details | illustrations |
Dimensions | ; 26 cm |
336 ## - CONTENT TYPE | |
Content type term | Text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | unmediated |
Media type code | n |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | volume |
Carrier type code | nc |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Table of ContentsIntroduction and Recap of First EditionA Modern Look at the Industrial Control System ArchitectureThe Industrial Demilitarized ZoneDesigning the ICS Architecture with Security in MindIntroduction to Security MonitoringPassive Security MonitoringActive Security MonitoringIndustrial Threat IntelligenceVisualizing, Correlating, and AlertingThreat HuntingThreat Hunt Scenario 1 - Malware BeaconingThreat Hunt Scenario 2 - Finding Malware and Unwanted ApplicationsThreat Hunt Scenario 3 - Suspicious External ConnectionsDifferent Types of Cybersecurity AssessmentsIndustrial Control System Risk AssessmentsRed Team/Blue Team ExercisesPenetration Testing ICS EnvironmentsIncident Response for the ICS EnvironmentLab Setup |
596 ## - | |
-- | 1 3 |
598 ## - | |
-- | NEWBOOKS |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
9 (RLIN) | 1412 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Process control |
General subdivision | Security measures |
9 (RLIN) | 3401 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | College | Home library | Current library | Shelving location | Date acquired | Coded location qualifier | Full call number | Department | Total checkouts | Call number | Barcode | Date due | Date last seen | Date last checked out | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Computer and Cyber Sciences | UPM Female Campus Library | UPM Male Campus Library | STACKS | 11/26/2023 | INTRANSIT | 005.82 API 2021 C.1 | Cyber Security & Forensic Computing | 2 | 005.82 API | UPM0000007262 | 12/31/2024 | 08/27/2024 | 08/27/2024 | C.1 | 03/10/2024 | Books | ||||
Dewey Decimal Classification | Computer and Cyber Sciences | UPM Male Campus Library | UPM Male Campus Library | STACKS | 11/26/2023 | CHECKEDOUT | 005.82 API 2021 C.2 | Cyber Security & Forensic Computing | 3 | 005.82 API | UPM0000007263 | 12/31/2024 | 08/26/2024 | 08/26/2024 | C.2 | 03/10/2024 | Books |