eBook: Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (DRM PDF)
 
電子書格式: DRM PDF
作者: Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla 
系列: River Publishers Series in Digital Security and Fo
分類: Forensic science ,
Biology, life sciences ,
Legal aspects of IT ,
Computer security ,
Computer science  
書城編號: 27014454

原價: HK$1170.00
現售: HK$1111.5 節省: HK$58.5

購買後立即進貨, 約需 1-4 天

 
 
製造商: River Publishers
出版日期: 2023/07/27
頁數: 246
ISBN: 9781000922387
 
>> 相關實體書

商品簡介
Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
River Publishers Series in Digital Security and Fo

eBook: Cyber Space and Outer Space Security (DRM PDF)

eBook: Cyber Space and Outer Space Security (DRM EPUB)

Cyber Space and Outer Space Security (Hardcover)

Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (Hardcover)

eBook: Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (DRM PDF)

eBook: Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (DRM EPUB)

eBook: Privacy and Security for Mobile Crowdsourcing (DRM EPUB)

eBook: Privacy and Security for Mobile Crowdsourcing (DRM PDF)

Privacy and Security for Mobile Crowdsourcing (Hardcover)

eBook: Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (DRM EPUB)

eBook: Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (DRM PDF)

eBook: Artificial Intelligence and Blockchain in Digital Forensics (DRM EPUB)

eBook: Artificial Intelligence and Blockchain in Digital Forensics (DRM PDF)

* 以上資料僅供參考之用, 香港書城並不保證以上資料的準確性及完整性。
* 如送貨地址在香港以外, 當書籍/產品入口時, 顧客須自行繳付入口關稅和其他入口銷售稅項。

 

 

 

  我的賬戶 |  購物車 |  出版社 |  團購優惠
加入供應商 |  廣告刊登 |  公司簡介 |  條款及細則
 
  香港書城 版權所有 私隱政策聲明
 
  顯示模式: 電腦版 (改為: 手機版)