Cybersecurity managing systems,conducting testing, and investigating intrusions
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security a...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons
© 2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Introduction
- Part I: Cyber Network Security Concepts
- Chapter 1: Executive Summary
- Chapter 2: The Problems: Cyber Antipatterns
- Chapter 3
- Enterprise Security Using the Zachman Framework
- Part II :Cyber Network Security Hands-On
- Chapter 4: Network Administration for Security Professionals
- Chapter 5: Customizing BackTrack and Security Tools
- Chapter 6: Protocol Analysis and Network Programming
- Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing
- Chapter 8: Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis
- Part III : Cyber Network Application Domains
- Chapter 10: Cybersecurity for End Users, Social Media, and Virtual Worlds
- Chapter 11: Cybersecurity Essentials for Small Business
- Chapter 12: Large Enterprise Cybersecurity: Data Centers and Clouds
- Chapter 13: Healthcare Information Technology Security
- Chapter 14: Cyber Warfare: An Architecture for Deterrence


