loading
Mastering Palo Alto Networks
September 7, 2020 - PACKT

Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey Features* Understand how to optimally use PAN-OS features* Build firewall solutions to safeguard local, cloud, and mobile networks* Protect your...

Multi-Cloud Architecture and Governance
December 11, 2020 - PACKT

A comprehensive guide to architecting, managing, implementing, and controlling multi-cloud environments Key Features • Deliver robust multi-cloud environments and improve your business productivity • Stay in control of the cost, governance, development, security, and continuous...

IEC 63096 - Nuclear power plants – Instrumentation, control and electrical power systems – Security controls
October 1, 2020 - IEC

General Since strict requirements on safety and availability of nuclear I&C apply, due consideration of cybersecurity threats is needed. Since nowadays nuclear I&C programmable digital systems are largely based on digital systems including networks, individual I&C systems are more and more...

AWS Penetration Testing
December 4, 2020 - PACKT

Get to grips with security assessment, vulnerability exploitation, workload security, and encryption with this guide to ethical hacking and learn to secure your AWS environmentKey Features* Perform cybersecurity events such as red or blue team activities and functional testing* Gain an overview and...

IEEE 1914.1 - Packet-based Fronthaul Transport Network
November 7, 2019 - IEEE

This standard specifies the following: - Architecture for the transport of mobile fronthaul traffic over packet-based networks (e.g., Ethernet), including user data traffic, and management and control plane traffic - Requirements and definitions for the fronthaul networks,...

IEEE 11073-40102 - Health informatics—Device interoperability Part 40102: Foundational—Cybersecurity— Capabilities for mitigation
September 24, 2020 - IEEE

Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a...

IETF RFC 8506 - Diameter Credit-Control Application
March 1, 2019 - IETF

This document specifies a Diameter application that can be used to implement real-time credit-control for a variety of end-user services such as network access, Session Initiation Protocol (SIP) services, messaging services, and download services. The Diameter Credit-...

DS/EN IEC 61970-301 - Energy management system application program interface (EMS-API) – Part 301: Common information model (CIM) base
August 31, 2020 - DS

IEC 61970-301:2020 (E) lays down the common information model (CIM), which is an abstract model that represents all the major objects in an electric utility enterprise typically involved in utility operations. By providing a standard way of representing power system resources as object classes...

NR/L2/CIV/095 - Asset Protection and Optimisation Management of Third Party Works on Network Rail Infrastructure
March 7, 2020 - NR

A Third Party is an organization other than Network Rail intending to undertake works which will physically change or impact the operation, assets, design or other functionality of Network Rail's infrastructure. The application of this business process is project specific, as agreed...

NR/L3/XNG/308 - Risk Assessing Level Crossings
September 5, 2020 - NR

This standard describes a method of risk assessing operational level crossings on Network Rail's managed infrastructure. It includes: a) the core level crossing risk assessment process; b) frequency of risk assessments; c) use of the All Level Crossing Risk Model (ALCRM) as the risk model;...

The Docker Workshop
October 29, 2020 - PACKT

Get started with Docker on your local machine and progress towards deploying useful applications in production with this simplified, practical guideKey Features* Get a working understanding of Docker containers by incorporating them in your development process* Complete interesting exercises to...

CSA ISO/IEC 8802-15-4 - Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs)
January 1, 2019 - CSA

This standard defines the physical layer (PHY) and medium access control (MAC) sublayer specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very limited battery consumption requirements. In addition, the standard provides...

UL 2900-2-3 - Software Cybersecurity for Network-Connectable Products, Part 2-3: Particular Requirements for Security and Life Safety Signaling Systems
January 31, 2020 - ULSE

029000-000020-000030 1 Scope 1.1 This security evaluation standard applies to the evaluation of security and life safety signaling system components. It applies to, but is not limited to, the following products: a) Alarm Control Units; b) Network-Based Intrusion Detection System; c)...

IEC TR 61850-90-4 - Communication networks and systems for power utility automation – Part 90-4: Network engineering guidelines
May 1, 2020 - IEC

General This part of IEC 61850, which is a Technical Report, is intended for an audience familiar with network communication and/or IEC 61850-based systems and particularly for substation protection and control equipment vendors, network equipment vendors and system integrators...

Advertisement