Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 4 of 4 results

ITU-T M.3410 - GUIDELINES AND REQUIREMENTS FOR SECURITY MANAGEMENT SYSTEMS TO SUPPORT TELECOMMUNICATIONS MANAGEMENT - STUDY GROUP 4 Organization: ITU-T
Date: 2008-08-01
Description: ., multiplexers, switches, routers, transport gateways, application gateways, gateway controllers, packet-filters a.k.a. firewalls, content filters, access points, bridges, wired and wireless telephony devices and monitoring probes for QoS, and network activity, to name a few); • End user host systems (e.g., laptop systems, desktop systems, workstations, printers, etc.); and • Management systems (e.g., element management, network management, service management, and business management systems).
IEC/TR 62443-3-1 - INDUSTRIAL COMMUNICATION NETWORKS – NETWORK AND SYSTEM SECURITY – PART 3-1: SECURITY TECHNOLOGIES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - EDITION 1.0 Organization: IEC
Date: 2009-07-01
Description: As such, this domain also includes, but is not limited to: firewalls, servers, routers, switches, gateways, fieldbus systems, intrusion detection systems, intelligent electronic/end devices, remote terminal units (RTUs), and both wired and wireless remote modems.
ISA TR99.00.01 - SECURITY TECHNOLOGIES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS Organization: ISA
Date: 2007-10-29
Description: As such, this domain also includes, but is not limited to: firewalls, servers, routers, switches, gateways, fieldbus systems, intrusion detection systems, intelligent electronic/end devices, remote terminal units (RTUs), and both wired and wireless remote modems.
PACKT - LEARNING NETWORK FORENSIC - LEARNING NETWORK FORENSICS Organization: PACKT
Date: 2016-02-29
Description: Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you.

1 - 4 of 4 results