Cybersecurity managing systems,conducting testing, and investigating intrusions
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security a...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons
© 2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100720 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025544.0 | ||
| 008 | 221104 2014 inua bi 000 0 eng d | ||
| 020 | |a 9781118697115 | ||
| 020 | |a 9781118697047 (ebk) | ||
| 020 | |a 9781118849651 (ebk) | ||
| 039 | 9 | |a 202211041125 |b VLOAD |c 201501141416 |d zul |c 201411181707 |d faezah |c 201411181707 |d faezah |y 201410131246 |z hasniza | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b M69 2014 | ||
| 100 | 1 | |a Mowbray, Thomas J. |e author | |
| 245 | 1 | 0 | |a Cybersecurity |b managing systems,conducting testing, and investigating intrusions |c Thomas J. Mowbray ; technical editor, Rob Shimonski |
| 264 | 1 | |a Indianapolis, IN |b John Wiley & Sons |c © 2014 | |
| 300 | |a xxiv, 336 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a Introduction -- Part I: Cyber Network Security Concepts -- Chapter 1: Executive Summary -- Chapter 2: The Problems: Cyber Antipatterns -- Chapter 3 -- Enterprise Security Using the Zachman Framework -- Part II :Cyber Network Security Hands-On -- Chapter 4: Network Administration for Security Professionals -- Chapter 5: Customizing BackTrack and Security Tools -- Chapter 6: Protocol Analysis and Network Programming -- Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing -- Chapter 8: Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis -- Part III : Cyber Network Application Domains -- Chapter 10: Cybersecurity for End Users, Social Media, and Virtual Worlds -- Chapter 11: Cybersecurity Essentials for Small Business -- Chapter 12: Large Enterprise Cybersecurity: Data Centers and Clouds -- Chapter 13: Healthcare Information Technology Security -- Chapter 14: Cyber Warfare: An Architecture for Deterrence | |
| 520 | |a A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture | ||
| 592 | |a 00013727 |b 04/11/2014 |c RM 239.80 |h PVK | ||
| 650 | 0 | |a Computer crimes |x Prevention | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Cyberspace |x Security measures | |
| 700 | 1 | |a Shimonski, Robert |e editor | |
| 999 | |a vtls000052915 |c 100720 |d 100720 | ||


