Ethically Hacking an Industrial Control System : : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / / Sharon Ferrone.
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | New Delhi, India : : BPB Publications,, [2022] Ã2022 |
Year of Publication: | 2022 |
Edition: | First edition. |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (i, 318 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
50030593808 |
---|---|
ctrlnum |
(MiAaPQ)50030593808 (Au-PeEL)EBL30593808 (OCoLC)1341685853 |
collection |
bib_alma |
record_format |
marc |
spelling |
Ferrone, Sharon, author. Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / Sharon Ferrone. First edition. New Delhi, India : BPB Publications, [2022] Ã2022 1 online resource (i, 318 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on print version record. Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer networks Security measures United States. Computer security United States. Process control Security measures United States. Electronic books. Print version: Ferrone, Sharon. Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker. First edition. New Delhi, India : BPB Publications, c2022 i, 318 pages 9789389328936 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30593808 Click to View |
language |
English |
format |
eBook |
author |
Ferrone, Sharon, |
spellingShingle |
Ferrone, Sharon, Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / |
author_facet |
Ferrone, Sharon, |
author_variant |
s f sf |
author_role |
VerfasserIn |
author_sort |
Ferrone, Sharon, |
title |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / |
title_sub |
Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / |
title_full |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / Sharon Ferrone. |
title_fullStr |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / Sharon Ferrone. |
title_full_unstemmed |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / Sharon Ferrone. |
title_auth |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / |
title_new |
Ethically Hacking an Industrial Control System : |
title_sort |
ethically hacking an industrial control system : analyzing, exploiting, mitigating, and safeguardingindustrial processes for an ethical hacker / |
publisher |
BPB Publications, |
publishDate |
2022 |
physical |
1 online resource (i, 318 pages) : illustrations |
edition |
First edition. |
isbn |
9789389328943 9789389328936 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 F477 42022 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
geographic_facet |
United States. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30593808 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
1341685853 |
work_keys_str_mv |
AT ferronesharon ethicallyhackinganindustrialcontrolsystemanalyzingexploitingmitigatingandsafeguardingindustrialprocessesforanethicalhacker |
status_str |
n |
ids_txt_mv |
(MiAaPQ)50030593808 (Au-PeEL)EBL30593808 (OCoLC)1341685853 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker / |
marc_error |
Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ] |
_version_ |
1792331046073663490 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01930nam a2200421 i 4500</leader><controlfield tag="001">50030593808</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20230921013543.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">230921s2022 ii a o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789389328936</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789389328943</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)50030593808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL30593808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1341685853</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.F477 2022</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferrone, Sharon,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethically Hacking an Industrial Control System :</subfield><subfield code="b">Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker /</subfield><subfield code="c">Sharon Ferrone.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi, India :</subfield><subfield code="b">BPB Publications,</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (i, 318 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Process control</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ferrone, Sharon.</subfield><subfield code="t">Ethically Hacking an Industrial Control System : Analyzing, Exploiting, Mitigating, and SafeguardingIndustrial Processes for an Ethical Hacker.</subfield><subfield code="b">First edition.</subfield><subfield code="d">New Delhi, India : BPB Publications, c2022 </subfield><subfield code="h">i, 318 pages </subfield><subfield code="z">9789389328936</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30593808</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |