Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Rethinking Cyber Security

(Autor)

Buch | Softcover
198 Seiten
2022
Kendall/Hunt Publishing Co ,U.S. (Verlag)
9798765705438 (ISBN)
CHF 119,60 inkl. MwSt
  • Titel nicht im Sortiment
  • Artikel merken
Provides the background information to understand how hackers operate, and the methodologies to implement to make sure key components of a network are secure. The historic layered approach has been updated to include concepts rarely implemented with out the box solutions that will take network security to the next level.
Cybersecurity is more than a buzz word. It is a necessity for every computer system and network on the planet. Hacking is at an all-time high with digital criminals stealing data from governments to technology companies, and everyone in between. Your data may be the next treasure trove of information a hacker wants to get their hands on, and your network may be the next target beaconing vulnerabilities across the internet. History has shown the only effective method at defending a network is to implement a layered security approach with security appliances and applications strategically placed throughout a network. But even some of those methods have failed.

Rethinking Cyber Security will give you the background information you need to understand how hackers operate, and the methodologies you can implement to make sure key components of your network are secure. The historic layered approach has been updated to include concepts rarely implemented with out the box solutions that will take network security to the next level. Defense of common attacks are given a new perspective with advice for more stringent controls to limit external and unauthorized access. And technical strategies are explained in simpler terms with examples anyone in the field can understand.

You will learn that security does not have to be difficult, overly complicated, or extremely expensive to be effective. Simpler strategies which use already available internet technologies can heighten the security of any network and keep hackers at bay. Practical application is included for key concepts with tips on how to practice new skills in a safe environment. Common poorly figured technologies which give hackers easier access to systems and data are also discussed. Do not worry. Even the most insecure network system can be hardened against an attack when you apply this new information.

Chapter 1: History
Chapter 2: Paradigm Shift
Chapter 3: Traffic Analysis
Chapter 4: Vulnerability Assessment
Chapter 5: Penetration Testing
Chapter 6: Incident Response Evidence Collection
Chapter 7: Incident Response Evidence Analysis
Chapter 8: Hardening Windows
Chapter 9: Hardening Linux
Chapter 10: Hardening Network
Chapter 11: Cloud Security
Chapter 12: Cryptography
Appendix 1: Linux Commands
Appendix 2: Meterpreter Commands
Appendix 3: Common Ports and Protocols

Erscheinungsdatum
Verlagsort Iowa
Sprache englisch
Gewicht 363 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-13 9798765705438 / 9798765705438
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95