ODBIERZ TWÓJ BONUS :: »

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa

Język publikacji: 1
IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - okladka książki

IoT and OT Security Handbook. Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa - okladka książki

Autorzy:
Smita Jain, Vasantha Lakshmi, Dr Rohini Srivathsa
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
172
Dostępne formaty:
     PDF
     ePub

Ebook 29,90 zł najniższa cena z 30 dni

94,99 zł (-10%)
85,49 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

29,90 zł najniższa cena z 30 dni

Poleć tę książkę znajomemu Poleć tę książkę znajomemu!!

Przenieś na półkę

Do przechowalni

Prezent last minute w ebookpoint.pl
The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.
The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You’ll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you’ll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.
By the end of this security book, you’ll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.

Wybrane bestsellery

O autorach książki

Business enabler and risk management focused, Smita has a unique and globally-experienced approach to Information Security, Data Privacy, IT, OT-IoT, and Digital Transformation.
Her hallmarks include transformative vision casting and strategy setting, operational and organizational excellence, and a risk-based approach to enterprise enablement.
Recognized thought leader in the transformation process, re-envisioning and establishing organizational cadence and culture. With an established track record of effectively working across various industries.
A cybersecurity consultant, strategist, mentor to organizations about the ever-changing cybersecurity landscape and helping them build a dynamic cybersecurity program.
Vasantha Lakshmi works at Microsoft India as a Technology Specialist and as previously a Program Manager. She holds Certified Information System Security Professional (CISSP) certification which aids in aligning with the industry standard of security. She has been working on various security products for the last Seven years. She has more than twelve years of experience working as an architect of end-to-end cybersecurity solutions(device, data, apps, O365, identity etc.) for Microsoft 365. Prosci Certified Change Practitioner certification aids in her journey to digitally transform organisations. She holds many certifications such as M365 Enterprise Administrator Expert, M365 Desktop Administrator Associate, SC-200, SC-300, MS-500.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę
Dodano produkt na półkę
Usunięto produkt z półki
Przeniesiono produkt do archiwum
Przeniesiono produkt do biblioteki

Zamknij

Wybierz metodę płatności

Ebook
85,49 zł
Dodaj do koszyka
Sposób płatności
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.