Alfred Basta - Böcker
Visar alla böcker från författaren Alfred Basta. Handla med fri frakt och snabb leverans.
4 produkter
4 produkter
1 135 kr
Skickas
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day – readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.
996 kr
Skickas inom 7-10 vardagar
Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studiesPen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.
Open-Source Security Operations Center (SOC)
A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Inbunden, Engelska, 2024
997 kr
Skickas inom 7-10 vardagar
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find: A modular design that facilitates use in a variety of classrooms and instructional settingsDetailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discoveryHands-on exercises, case studies, and end-of-chapter questions to enable learning and retentionPerfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.
1 172 kr
Skickas inom 7-10 vardagar
Balanced, in-depth exploration of mathematics in cybersecurity, supported by case studies and other learning features With clear and concise explanations, practical examples, case studies, and real-world applications, Mathematics in Cybersecurity is an essential learning aid for readers seeking an understanding of the fundamental concepts in the field. This comprehensive book delves into a wide range of topics, including sets, logic, binary and other number systems, logic gates, combinatorial logic circuits, equations and graphs, linear equations and matrices, sequences and series. Other topics covered include right triangle geometry and trigonometry, exponential and logarithmic equations, probability, statistics, graph theory, and cryptography. The book is an ideal companion resource for courses involving mathematical concepts in cybersecurity. It allows tailoring of the content to meet the needs of career education and online schools, ensuring it is comprehensible to students who may be learning remotely and relying on self-study. Mathematics in Cybersecurity also includes information on: Discrete math, set theory fundamentals, propositional logic, and number systems and conversionsDigital logic circuits, linear equations and matrices, sequences and recursion, and trigonometry and pre-calculusComplex numbers, exponential and logarithmic functions, and probability and counting techniquesGraph theory applications and coding for cryptographyBy adopting a balanced approach that combines traditional and contemporary ideas, Mathematics in Cybersecurity provides a readable and rigorous treatment of the subject matter for aspiring cybersecurity professionals, equipping them with the necessary tools to tackle complex cybersecurity challenges confidently and excel in their field.