Cantitate/Preț
Produs

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture

Editat de Anand Handa, Rohit Negi, Sandeep Kumar Shukla
en Limba Engleză Paperback – 21 oct 2024
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the opensource software domain. This book has 8 chapters describing these projects in detail with recipes on how to use opensource tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 30174 lei  6-8 săpt.
  River Publishers – 21 oct 2024 30174 lei  6-8 săpt.
Hardback (1) 73519 lei  6-8 săpt.
  River Publishers – 31 mai 2021 73519 lei  6-8 săpt.

Preț: 30174 lei

Preț vechi: 36142 lei
-17% Nou

Puncte Express: 453

Preț estimativ în valută:
5339 6261$ 4689£

Carte tipărită la comandă

Livrare economică 10-24 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9788770043076
ISBN-10: 8770043078
Pagini: 278
Dimensiuni: 156 x 234 mm
Greutate: 0.45 kg
Ediția:1
Editura: River Publishers

Public țintă

Academic

Cuprins

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture

Notă biografică

Anand Handa, Rohit Negi, Sandeep Kumar Shukla

Descriere

This book demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.