Cantitate/Preț
Produs

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture

Editat de Anand Handa, Rohit Negi, Sandeep Kumar Shukla
en Limba Engleză Paperback – 21 oct 2024
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the opensource software domain. This book has 8 chapters describing these projects in detail with recipes on how to use opensource tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 25724 lei  6-8 săpt.
  River Publishers – 21 oct 2024 25724 lei  6-8 săpt.
Hardback (1) 73519 lei  6-8 săpt.
  River Publishers – 31 mai 2021 73519 lei  6-8 săpt.

Preț: 25724 lei

Preț vechi: 38753 lei
-34% Nou

Puncte Express: 386

Preț estimativ în valută:
4552 5345$ 3995£

Carte tipărită la comandă

Livrare economică 27 ianuarie-10 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9788770043076
ISBN-10: 8770043078
Pagini: 278
Dimensiuni: 156 x 234 mm
Greutate: 0.51 kg
Ediția:1
Editura: River Publishers
Colecția River Publishers

Public țintă

Academic

Cuprins

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture

Notă biografică

Anand Handa, Rohit Negi, Sandeep Kumar Shukla

Descriere

This book demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.