Book Content
chapters • 10h48m total length
1. An Unprecedented Opportunity at Stake
2. Industrial Data Pipeline and Security Architecture
3. IIoT Identity and Access Management
4. Endpoint Security and Trustworthiness
5. Securing Connectivity and Communications
6. Securing IIoT Edge, Cloud and Apps
7. Secure Processes and Governance
8. IIoT Security using Emerging Technologies
9. IIoT Security: Real World Case Studies
10. The Road Ahead
11. Appendix I
12. Appendix II














