Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions - PDF & ePUB Download

-
Download Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions ebook
PDF, ePUB

-

Description of Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions ebook

Download Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions, pdf, epub free. A must-have, hands-on guide for working in the cybersecurity profession
Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.
  • Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills
  • Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations
  • Delves into network administration for Windows, Linux, and VMware
  • Examines penetration testing, cyber investigations, firewall configuration, and security tool customization
  • Shares techniques for cybersecurity testing, planning, and reporting
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.
-

Content

Part I - Cyber Network Security Concepts
Chapter 1. Executive Summary
Chapter 2. The Problems: Cyber Antipatterns
Chapter 3. Enterprise Security Using the Zachman Framework

Part II - Cyber Network Security Hands-On
Chapter 4. Network Administration for Security Professionals
Chapter 5. Customizing BackTrack and Security Tools
Chapter 6. Protocol Analysis and Network Programming
Chapter 7. Reconnaissance, Vulnerability Assessment, and Cyber Testing
Chapter 8. Penetration Testing
Chapter 9. Cyber Network Defense Using Advanced Log Analysis

Part III - Cyber Network Application Domains
Chapter 10. Cybersecurity for End Users, Social Media, and Virtual Worlds
Chapter 11. Cybersecurity Essentials for Small Business
Chapter 12. Large Enterprise Cybersecurity: Data Centers and Clouds
Chapter 13. Healthcare Information Technology Security
Chapter 14. Cyber Warfare: An Architecture for Deterrence

Download pdf, epub, Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

-
Add comments
Прокомментировать
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив

-