Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey Features* Understand how to optimally use PAN-OS features* Build firewall solutions to safeguard local, cloud, and mobile networks* Protect your...
A comprehensive guide to architecting, managing, implementing, and controlling multi-cloud environments Key Features • Deliver robust multi-cloud environments and improve your business productivity • Stay in control of the cost, governance, development, security, and continuous...
General Since strict requirements on safety and availability of nuclear I&C apply, due consideration of cybersecurity threats is needed. Since nowadays nuclear I&C programmable digital systems are largely based on digital systems including networks, individual I&C systems are more and more...
Get to grips with security assessment, vulnerability exploitation, workload security, and encryption with this guide to ethical hacking and learn to secure your AWS environmentKey Features* Perform cybersecurity events such as red or blue team activities and functional testing* Gain an overview and...
This standard specifies the following: - Architecture for the transport of mobile fronthaul traffic over packet-based networks (e.g., Ethernet), including user data traffic, and management and control plane traffic - Requirements and definitions for the fronthaul networks,...
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a...
This document specifies a Diameter application that can be used to implement real-time credit-control for a variety of end-user services such as network access, Session Initiation Protocol (SIP) services, messaging services, and download services. The Diameter Credit-...
IEC 61970-301:2020 (E) lays down the common information model (CIM), which is an abstract model that represents all the major objects in an electric utility enterprise typically involved in utility operations. By providing a standard way of representing power system resources as object classes...
A Third Party is an organization other than Network Rail intending to undertake works which will physically change or impact the operation, assets, design or other functionality of Network Rail's infrastructure. The application of this business process is project specific, as agreed...
This standard describes a method of risk assessing operational level crossings on Network Rail's managed infrastructure. It includes: a) the core level crossing risk assessment process; b) frequency of risk assessments; c) use of the All Level Crossing Risk Model (ALCRM) as the risk model;...
Get started with Docker on your local machine and progress towards deploying useful applications in production with this simplified, practical guideKey Features* Get a working understanding of Docker containers by incorporating them in your development process* Complete interesting exercises to...
This standard defines the physical layer (PHY) and medium access control (MAC) sublayer specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very limited battery consumption requirements. In addition, the standard provides...
029000-000020-000030
General This part of IEC 61850, which is a Technical Report, is intended for an audience familiar with network communication and/or IEC 61850-based systems and particularly for substation protection and control equipment vendors, network equipment vendors and system integrators...