Waqar Anwar - Böcker
Visar alla böcker från författaren Waqar Anwar. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
996 kr
Skickas inom 7-10 vardagar
Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studiesPen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.
Open-Source Security Operations Center (SOC)
A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Inbunden, Engelska, 2024
997 kr
Skickas inom 7-10 vardagar
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find: A modular design that facilitates use in a variety of classrooms and instructional settingsDetailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discoveryHands-on exercises, case studies, and end-of-chapter questions to enable learning and retentionPerfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.
1 333 kr
Kommande
Protect medical devices with lifecycle security strategies that safeguard patients Connected medical devices from pacemakers to diagnostic imaging systems present unique cybersecurity vulnerabilities that directly impact patient safety. Cybersecurity for Medical Devices provides healthcare cybersecurity professionals and medical device engineers with actionable guidance on embedding security throughout the device lifecycle. Written by a Certified Health Data Analyst and cybersecurity specialist, this book integrates clinical realities with technical security frameworks. The book delivers step-by-step instruction in risk assessment, threat modeling, device architecture review, regulatory compliance, and incident response. It addresses how security measures must integrate with fast-paced healthcare delivery environments while establishing cybersecurity as an ethical imperative. Real-world examples ground theoretical concepts in documented incidents, tracing the evolution from security through obscurity to sophisticated threat models. The book also provides: Comprehensive frameworks for embedding security from device conception through decommission, addressing each phase of the medical device lifecycle systematicallyDetailed threat modeling approaches specific to networked medical equipment including implantable devices, diagnostic systems, and hospital network infrastructureGuidance on navigating regulatory compliance requirements while maintaining operational efficiency in high-pressure clinical environments and healthcare delivery settingsEthical frameworks positioning cybersecurity as a patient safety imperative rather than merely a technical checkbox or compliance requirementHistorical context explaining how medical device security evolved alongside increasingly sophisticated cyberattack methodologies targeting healthcare systemsHealthcare cybersecurity professionals, medical device engineers, regulatory compliance officers, and clinical IT managers will find this book connects security expertise with medical device engineering realities. Researchers and advanced students studying healthcare technology security gain practical frameworks applicable to emerging connected device challenges.