Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques
Key Features:
Understand what happens in an attack and build the proper defenses to secure your organization
Defend against hacking techniques such as social engineering, phishing, and many more
Partner with your end user community by building effective security awareness training programs
Book Description:
Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised.
This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world.
By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.
What You Will Learn:
Understand the macro-implications of cyber attacks
Identify malicious users and prevent harm to your organization
Find out how ransomware attacks take place
Work with emerging techniques for improving security profiles
Explore identity and access management and endpoint security
Get to grips with building advanced automation models
Build effective training programs to protect against hacking techniques
Discover best practices to help you and your family stay safe online
Who this book is for:
This book is for security practitioners, including analysts, engineers, and security leaders, who want to better understand cybersecurity challenges. It is also for beginners who want to get a holistic view of information security to prepare for a career in the cybersecurity field. Business leaders looking to learn about cyber threats and how they can protect their organizations from harm will find this book especially useful. Whether you're a beginner or a seasoned cybersecurity professional, this book has something new for everyone.
Описание: Securing and hardening your Windows environment will enhance protection to secure your company`s data and users. This book will provide the knowledge you need to secure the Windows environment. Windows Security and Hardening covers the best practices you can implement in real-world scenarios.
Описание: This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered.
Автор: Tevault Donald a. Название: Mastering Linux Security and Hardening ISBN: 1838981772 ISBN-13(EAN): 9781838981778 Издательство: Неизвестно Рейтинг: Цена: 11585.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Hardening a Linux system can make it much more difficult for an attacker to exploit it. This book will enable system administrators and network engineers to protect their Linux systems, and the sensitive data on those systems.
Автор: Monte Matt Название: Network Attacks and Exploitation: A Framework ISBN: 1118987128 ISBN-13(EAN): 9781118987124 Издательство: Wiley Рейтинг: Цена: 5702.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage.
Автор: Mishra Preeti, Pilli Emmanuel S., Joshi R. C. Название: Cloud Security: Attacks, Techniques, Tools, and Challenges ISBN: 0367435829 ISBN-13(EAN): 9780367435820 Издательство: Taylor&Francis Рейтинг: Цена: 20671.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud deployment models, key technologies, service platforms and challenges.
Автор: Prowell, Stacy Название: Seven Deadliest Network Attacks ISBN: 1597495492 ISBN-13(EAN): 9781597495493 Издательство: Elsevier Science Рейтинг: Цена: 3199.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of Service; War Dialing; Penetration `Testing`; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay.
Автор: Dunham, Ken Название: Mobile Malware Attacks And Defense ISBN: 1597492981 ISBN-13(EAN): 9781597492980 Издательство: Elsevier Science Рейтинг: Цена: 7409.00 р. Наличие на складе: Нет в наличии.
Описание: Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This book covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. It helps you to analyze mobile device/platform vulnerabilities and exploits.
Автор: Tiensivu, Aaron Название: Securing Windows Server 2008 ISBN: 1597492809 ISBN-13(EAN): 9781597492805 Издательство: Elsevier Science Рейтинг: Цена: 6904.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Describes various technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system. This book outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment.
Автор: Gupta, Brij B. Название: Distributed Denial of Service (DDoS) Attacks ISBN: 1003147461 ISBN-13(EAN): 9781003147466 Издательство: Taylor&Francis Рейтинг: Цена: 3214.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Brancik, Kenneth Название: Insider Computer Fraud ISBN: 1420046594 ISBN-13(EAN): 9781420046595 Издательство: Taylor&Francis Рейтинг: Цена: 21437.00 р. Наличие на складе: Нет в наличии.
Описание: Web Application Security is a relevant aspect nowadays. Many operations and transactions happen every day on the Worldwide Web, often relying on Databases. SQL Injection Strategies will both show you SQL injection in action, alongside defensive measures. The book also deals with SQL Injection scenarios in the IoT and mobile environments
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru