Welcome to UPM Library, Online Public Access Catalogue (OPAC)

Industrial cybersecurity (Record no. 1034)

MARC details
000 -LEADER
fixed length control field 01526cam a2200241 i 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231126n2021 af 000 0 eng u
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781800202092
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) a3073
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number <a href="005.82">005.82</a>
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ackerman, Pascal
Relator term , author
9 (RLIN) 3400
245 10 - TITLE STATEMENT
Title Industrial cybersecurity
Remainder of title : efficiently monitor the cybersecurity posture of your ICS environment
Statement of responsibility, etc. / Pascal Ackerman.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing
Date of production, publication, distribution, manufacture, or copyright notice , 2021
300 ## - PHYSICAL DESCRIPTION
Extent xx, 779 pages :
Other physical details illustrations
Dimensions ; 26 cm
336 ## - CONTENT TYPE
Content type term Text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Table of ContentsIntroduction and Recap of First EditionA Modern Look at the Industrial Control System ArchitectureThe Industrial Demilitarized ZoneDesigning the ICS Architecture with Security in MindIntroduction to Security MonitoringPassive Security MonitoringActive Security MonitoringIndustrial Threat IntelligenceVisualizing, Correlating, and AlertingThreat HuntingThreat Hunt Scenario 1 - Malware BeaconingThreat Hunt Scenario 2 - Finding Malware and Unwanted ApplicationsThreat Hunt Scenario 3 - Suspicious External ConnectionsDifferent Types of Cybersecurity AssessmentsIndustrial Control System Risk AssessmentsRed Team/Blue Team ExercisesPenetration Testing ICS EnvironmentsIncident Response for the ICS EnvironmentLab Setup
596 ## -
-- 1 3
598 ## -
-- NEWBOOKS
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 1412
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Process control
General subdivision Security measures
9 (RLIN) 3401
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan College Home library Current library Shelving location Date acquired Coded location qualifier Full call number Department Total checkouts Call number Barcode Date due Date last seen Date last checked out Copy number Price effective from Koha item type
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Female Campus Library UPM Male Campus Library STACKS 11/26/2023 INTRANSIT 005.82 API 2021 C.1 Cyber Security & Forensic Computing 2 005.82 API UPM0000007262 12/31/2024 08/27/2024 08/27/2024 C.1 03/10/2024 Books
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Male Campus Library UPM Male Campus Library STACKS 11/26/2023 CHECKEDOUT 005.82 API 2021 C.2 Cyber Security & Forensic Computing 3 005.82 API UPM0000007263 12/31/2024 08/26/2024 08/26/2024 C.2 03/10/2024 Books

            Visit counter For Websites University of Prince Mugrin - Library

Powered by Koha