×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

(ebook) (audiobook) (audiobook) Książka w języku 1
IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - okladka książki

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - okladka książki

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - audiobook MP3

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - audiobook CD

Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
172
Dostępne formaty:
     PDF
     ePub
The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.
The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You’ll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you’ll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.
By the end of this security book, you’ll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.

Wybrane bestsellery

O autorach książki

Business enabler and risk management focused, Smita has a unique and globally-experienced approach to Information Security, Data Privacy, IT, OT-IoT, and Digital Transformation.
Her hallmarks include transformative vision casting and strategy setting, operational and organizational excellence, and a risk-based approach to enterprise enablement.
Recognized thought leader in the transformation process, re-envisioning and establishing organizational cadence and culture. With an established track record of effectively working across various industries.
A cybersecurity consultant, strategist, mentor to organizations about the ever-changing cybersecurity landscape and helping them build a dynamic cybersecurity program.
Vasantha Lakshmi works at Microsoft India as a Technology Specialist and as previously a Program Manager. She holds Certified Information System Security Professional (CISSP) certification which aids in aligning with the industry standard of security. She has been working on various security products for the last Seven years. She has more than twelve years of experience working as an architect of end-to-end cybersecurity solutions(device, data, apps, O365, identity etc.) for Microsoft 365. Prosci Certified Change Practitioner certification aids in her journey to digitally transform organisations. She holds many certifications such as M365 Enterprise Administrator Expert, M365 Desktop Administrator Associate, SC-200, SC-300, MS-500.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności