Cybersecurity managing systems,conducting testing, and investigating intrusions

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security a...

Full description

Saved in:
Bibliographic Details
Main Author: Mowbray, Thomas J. (Author)
Other Authors: Shimonski, Robert (Editor)
Format: Book
Language:English
Published: Indianapolis, IN John Wiley & Sons © 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 100720
003 MY-KLNDU
005 20241220025544.0
008 221104 2014 inua bi 000 0 eng d
020 |a 9781118697115 
020 |a 9781118697047 (ebk) 
020 |a 9781118849651 (ebk) 
039 9 |a 202211041125  |b VLOAD  |c 201501141416  |d zul  |c 201411181707  |d faezah  |c 201411181707  |d faezah  |y 201410131246  |z hasniza 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b M69 2014 
100 1 |a Mowbray, Thomas J.  |e author 
245 1 0 |a Cybersecurity  |b managing systems,conducting testing, and investigating intrusions  |c Thomas J. Mowbray ; technical editor, Rob Shimonski 
264 1 |a Indianapolis, IN  |b John Wiley & Sons  |c © 2014 
300 |a xxiv, 336 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a Introduction -- Part I: Cyber Network Security Concepts -- Chapter 1: Executive Summary -- Chapter 2: The Problems: Cyber Antipatterns -- Chapter 3 -- Enterprise Security Using the Zachman Framework -- Part II :Cyber Network Security Hands-On -- Chapter 4: Network Administration for Security Professionals -- Chapter 5: Customizing BackTrack and Security Tools -- Chapter 6: Protocol Analysis and Network Programming -- Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing -- Chapter 8: Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis -- Part III : Cyber Network Application Domains -- Chapter 10: Cybersecurity for End Users, Social Media, and Virtual Worlds -- Chapter 11: Cybersecurity Essentials for Small Business -- Chapter 12: Large Enterprise Cybersecurity: Data Centers and Clouds -- Chapter 13: Healthcare Information Technology Security -- Chapter 14: Cyber Warfare: An Architecture for Deterrence 
520 |a A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture 
592 |a 00013727  |b 04/11/2014  |c RM 239.80  |h PVK 
650 0 |a Computer crimes  |x Prevention 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Cyberspace  |x Security measures 
700 1 |a Shimonski, Robert  |e editor 
999 |a vtls000052915  |c 100720  |d 100720