River Publishers Rapids Series in Digital Security and Forensics - Böcker
Visar alla böcker i serien River Publishers Rapids Series in Digital Security and Forensics. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
1 502 kr
Skickas inom 10-15 vardagar
This book is a practical guide to defending critical infrastructure in today’s cyber world. Critical infrastructure includes energy, power, water, transportation, manufacturing, and facility systems, along with the sensors and actuators that make up operational technology (OT). It presents a systems engineering framework for coordinating interdependent organizations and technologies, ensuring seamless performance across multiple fields.Bridging the traditional divide between information technology (IT), operational technology (OT), and cybersecurity, the book offers practical starting points and disciplined approaches for governance boards, project managers, and engineers. Clear guidance is provided on how to implement cybersecurity mitigations within critical infrastructure, making complex concepts accessible and actionable.Many professionals in infrastructure operations, engineering, and technical management feel unprepared to address cyber threats. This book fills that gap, serving as both a self-study resource and a refresher for those without formal training in computer science, cyber, or control systems—and as a teaching tool for explaining these principles to others.The goal is to present enduring cybersecurity concepts through proven systems engineering methods, along with new techniques to align stakeholders and resources. From technicians and operators to designers and decision-makers, readers will gain tools to connect cybersecurity practices with mission objectives.By combining systems engineering and cyber defense principles, this book equips professionals to work effectively with incident responders, analysts, engineers, and senior management. Decision-making skills are presented in a clear, easy-to-understand style, supported by candid questions, current strategies, and real-world, case-based examples.
1 546 kr
Skickas inom 10-15 vardagar
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and solutions considering resource constraints, network architecture, and communication protocols.IoMT is revolutionizing the medical sector by providing personalized and targeted treatments and by facilitating seamless communication of medical data. IoMT devices are more trustworthy in monitoring and tracking due to higher accuracy levels, which also minimize human errors and inaccurate reporting. While the merits of IoMT devices are clear, they also pose severe privacy and security risks. Medical systems acquire, process, and perform decision-making based on this sensitive health information. Cyber attackers who exploit the flaws and weaknesses in these IoMT devices might well be able to penetrate the hospital network and gain unauthorized access to private patient data. Attacks on these IoMT devices also have the potential to endanger the patients' lives and cause serious physical harm.In addition to outlining viable solutions that take into account constrained resources at IoMT end-devices, hybrid network architecture, application characteristics, and communication protocols, the book covers the core concepts of IoMT security and privacy. It describes both theoretical and practical aspects for those working in security in the IoMT, emphasizing the most significant potential IoT security issues and challenges.
651 kr
Skickas inom 10-15 vardagar
The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:CloudNetworkingIdentity managementOperational Technology (OT)5GZero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.