|
|
|
|
LEADER |
03933nmm a2200433 i 4500 |
001 |
ebook-28031163X |
005 |
20240917153234.0 |
007 |
cu|uuu---uuuuu |
008 |
240917s2024||||uk ||||g|||| ||||||eng d |
020 |
|
|
|a 9781837633562
|
035 |
|
|
|a (OCoLC)1456999390
|
035 |
|
|
|a FRCYB88957576
|
035 |
|
|
|a FRCYB26088957576
|
035 |
|
|
|a FRCYB24788957576
|
035 |
|
|
|a FRCYB24888957576
|
035 |
|
|
|a FRCYB29388957576
|
035 |
|
|
|a FRCYB084688957576
|
035 |
|
|
|a FRCYB087588957576
|
035 |
|
|
|a FRCYB56788957576
|
035 |
|
|
|a FRCYB097088957576
|
035 |
|
|
|a FRCYB087088957576
|
040 |
|
|
|a ABES
|b fre
|e AFNOR
|
041 |
0 |
|
|a eng
|2 639-2
|
100 |
1 |
|
|a Toledano, Soledad Antelada.
|4 aut.
|e Auteur
|
245 |
1 |
0 |
|a Critical Infrastructure Security :
|b Cybersecurity lessons learned from real-world breaches
|c Soledad Antelada Toledano.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing.
|
264 |
|
2 |
|a Paris :
|b Cyberlibris,
|c 2024.
|
336 |
|
|
|b txt
|2 rdacontent
|
337 |
|
|
|b c
|2 rdamedia
|
337 |
|
|
|b b
|2 isbdmedia
|
338 |
|
|
|b ceb
|2 RDAfrCarrier
|
500 |
|
|
|a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781837633562.jpg).
|
506 |
|
|
|a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement
|e Cyberlibris
|
520 |
|
|
|a Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructureKey FeaturesGain an overview of the fundamental principles of cybersecurity in critical infrastructureExplore real-world case studies that provide a more exciting learning experience, increasing retentionBridge the knowledge gap associated with IT/OT convergence through practical examplesPurchase of the print or Kindle book includes a free PDF eBookBook Description - This book will help you get to grips with core infrastructure cybersecurity concepts through real-world accounts of common assaults on critical infrastructure. . - You'll gain an understanding of vital systems, networks, and assets essential for national security, economy, and public health. . - To learn all about cybersecurity principles, you'll go from basic concepts to common attack types and vulnerability life cycles. . - After studying real-world breaches for insights and practical lessons to prevent future incidents, you'll examine how threats like DDoS and APTs activate, operate, and succeed. . - You'll also analyze risks posed by computational paradigms: AI and quantum computing advancements vs. legacy infrastructure. . - By the end of this book, you'll be able to identify key cybersecurity principles to mitigate evolving attacks on critical infrastructure. What you will learnUnderstand critical infrastructure and its importance to a nationAnalyze the vulnerabilities in critical infrastructure systemsAcquire knowledge of the most common types of cyberattacks on critical infrastructureImplement techniques and strategies for protecting critical infrastructure from cyber threatsDevelop technical insights into significant cyber attacks from the past decadeDiscover emerging trends and technologies that could impact critical infrastructure securityExplore expert predictions about cyber threats and how they may evolve in the coming yearsWho this book is forThis book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial
|
856 |
|
|
|q HTML
|u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88957576
|w Données éditeur
|z Accès à l'E-book
|
886 |
2 |
|
|2 unimarc
|a 181
|a i#
|b xxxe##
|
993 |
|
|
|a E-Book
|
994 |
|
|
|a BNUM
|
995 |
|
|
|a 28031163X
|