Оценить:
 Рейтинг: 0

Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions

Год написания книги
2018
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations Delves into network administration for Windows, Linux, and VMware Examines penetration testing, cyber investigations, firewall configuration, and security tool customization Shares techniques for cybersecurity testing, planning, and reporting Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.
На сайте электронной библиотеки Litportal вы можете скачать книгу Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions в формате fb2, rtf, pdf, txt, epub. У нас можно прочитать отзывы и рецензии о этом произведении.

Читать онлайн

Помогите, пожалуйста, другим читателям нашего сайта, оставьте отзыв или рецензию о прочитанной книге.


Спасибо! Ваш отзыв был отправлен на модерацию.

Отзывы о книге Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions

список сообщений пуст