Wydawca: Packt Publishing
Oleg Skulkin
Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You’ll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you’ll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.By the end of this ransomware book, you’ll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.
Roberto Martinez
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
Dale Cruse, Denis Boudreau, Glenda Sims
Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders—Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong—this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You’ll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.*Email sign-up and proof of purchase required
Fabio Roberti, Decio Ferreira
Increasing Autodesk Revit Productivity for BIM Projects takes a hands-on approach to implementing Revit effectively for everyone curious about this new and exciting methodology.Complete with step-by-step explanations of essential concepts and practical examples, this Revit book begins by explaining the principles of productivity in Revit and data management for BIM projects. You'll get to grips with the primary BIM documentation to start a BIM project, including the contract, Exchange Information Requirements (EIR), and BIM Execution Plan (BEP/BXP). Later, you'll create a Revit template, start a Revit project, and explore the core functionalities of Revit to increase productivity. Once you've built the foundation, you'll learn about Revit plugins and use Dynamo for visual programming and Power BI for analyzing BIM information.By the end of this book, you'll have a solid understanding of Revit as construction and design software, how to increase productivity in Revit, and how to apply multiple workflows in your project to manage BIM.
Olushola Akande
Industrial automation has become a popular solution for various industries looking to reduce manual labor inputs and costs by automating processes. This book helps you discover the abilities necessary for excelling in this field.The book starts with the basics of industrial automation before progressing to the application of switches, sensors, actuators, and motors, and a direct on-line (DOL) starter and its components, such as circuit breakers, contactors, and overload relay. Next, you'll explore VFDs, their parameter settings, and how they can be wired and programmed for induction motor control. As you advance, you'll learn the wiring and programming of major industrial automation tools – PLCs, HMIs, and SCADA. You’ll also get to grips with process control and measurements (temperature, pressure, level, and flow), along with analog signal processing with hands-on experience in connecting a 4–20 mA transmitter to a PLC. The concluding chapters will help you grasp various industrial network protocols such as FOUNDATION Fieldbus, Modbus, PROFIBUS, PROFINET, and HART, as well as emerging trends in manufacturing (Industry 4.0) and its empowering technologies (such as IoT, AI, and robotics).By the end of this book, you’ll have gained a practical understanding of industrial automation concepts for machine automation and control.
Pascal Ackerman
With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
Pascal Ackerman
With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.
Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...
Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This book is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the book will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this book, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.