Installieren Sie die genialokal App auf Ihrem Startbildschirm für einen schnellen Zugriff und eine komfortable Nutzung.
Tippen Sie einfach auf Teilen:
Und dann auf "Zum Home-Bildschirm [+]".
Bei genialokal.de kaufen Sie online bei Ihrer lokalen, inhabergeführten Buchhandlung!
Ihr gewünschter Artikel ist in 0 Buchhandlungen vorrätig - wählen Sie hier eine Buchhandlung in Ihrer Nähe aus:
Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastructure, and assets across sectors like manufacturing, energy, transportation, and utilities. It includes systems such as Industrial Control Systems (ICS), SCADA, PLCs, and DCS.
ICS Security is the protection of industrial automation and control systems that manage critical operations like power generation, water treatment, and oil and gas production. Its goal is to safeguard confidentiality, integrity, and availability while mitigating risks from cyber threats, disruptions, and unauthorized access.
With this book, our goal is to help readers understand how to secure complex industrial environments by providing a clear introduction to ICS and OT security.
We will begin by explaining what ICS and OT are, how they differ from traditional IT, and why those differences matter. From there, the discussion will focus on the increasing importance of ICS/OT security—particularly in the context of IT and OT convergence, where systems and data are becoming more interconnected.
You will also gain an understanding of the key components that make up Industrial Control Systems and how they work together to monitor and control industrial operations. These components—including SCADA, PLC, HMI, and DCS—are essential for ensuring operational efficiency, safety, and security in industries like manufacturing, energy, and critical infrastructure.
What you Will Learn
· · · · · The most common and widely used ICS/OT standards, tools, and frameworks
Who This Book is for:
Beginners of OT Security environment. The book assumes you have an understanding of the IT Security environment and will be a great book for those who wish to learn the major differences and key elements of ICS and OT Security.
Massimo Nardone has more than 30 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He holds an M.Sc. degree in computing science from the University of Salerno, Italy.
Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.
He is currently working as Vice President of OT Security for SSH Communications Security.
He is an Apress co-author of numerous books, including Spring Security 6 Recipes, Secure RESTful APIs, Cybersecurity Threats and Attacks in the Gaming Industry, Pro Spring Security, Beginning EJB in Java EE 8, Pro JPA 2 in Java EE 8 , Pro Android Games, and has reviewed more than 100 titles.