Hands-on cybersecurity for architects plan and design robust security architectures
Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. Basic understanding of network and computer security implementation will be helpful. This book is...
Saved in:
| Main Authors: | Rerup, Neil (Author), Aslaner, Milad (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Birmingham, U.K.
Packt Publishing Ltd.
2018
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Hands-on cybersecurity for finance identify vulnerabilities and secure your financial services from security breaches
by: Ozkaya, Erdal, et al.
Published: (2019)
by: Ozkaya, Erdal, et al.
Published: (2019)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by: Gupta, Rajneesh
Published: (2018)
by: Gupta, Rajneesh
Published: (2018)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Industrial cybersecurity efficiently secure critical infrastructure systems
by: Ackerman, Pascal
Published: (2017)
by: Ackerman, Pascal
Published: (2017)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Cybersecurity Ops with bash attack, defend, and analyze from the command line
by: Troncone, Paul, et al.
Published: (2019)
by: Troncone, Paul, et al.
Published: (2019)
Cybersecurity education for awareness and compliance
Published: (2019)
Published: (2019)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Hands-on ethical hacking and network defense
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Hardening network infrastructure
by: Noonan, Wesley J.
Published: (2004)
by: Noonan, Wesley J.
Published: (2004)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Managing information security
Published: (2014)
Published: (2014)
Big book of IPsec RFCs Internet security architecture
by: Loshin
Published: (2000)
by: Loshin
Published: (2000)
Similar Items
-
Hands-on cybersecurity for finance identify vulnerabilities and secure your financial services from security breaches
by: Ozkaya, Erdal, et al.
Published: (2019) -
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024) -
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by: Gupta, Rajneesh
Published: (2018) -
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015) -
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)


