

Thomas J. Mowbray, PhD, holds gold-level certification from the SANS Institute in network penetration and ethical hacking.
Meer over Thomas MowbrayCybersecurity
Managing Systems, Conducting Testing, and Investigating Intrusions
Samenvatting
Your organization is probably under attack right now.
What are you doing about it?
Cyber crime is perhaps the fastest-growing crime category, increasing by as much as 300 percent each year. Your organization is undoubtedly under attack at this very moment. This book looks at security systemically. Beginning with the use of antipatterns and moving through improvements in security architecture, customizing tools, effective pen testing, and network monitoring, it demonstrates how to build security into your systems. Whether you're dealing with a small business or a major enterprise, you'll learn how to create and maintain cybersecurity that works.
- Examine a range of common antipatterns and their refactored solutions
- Ensure protection of Linux as well as Windows environments
- Learn specific tools and protocols for securing healthcare IT
- Use the exercises at the end of each chapter to improve your understanding
- Educate your staff with a cybersecurity course built on this guide
- Learn how to create, use, and migrate virtual machines for testing
- Understand how cloud computing affects enterprise security
- Customize BackTrack Linux test discs with advanced tools
- Dive deeper into intense topics such as advanced Wireshark/tcpdump filtering, Windows/Linux/Python network programming, and invoking automated Metasploit attacks from operating system command lines and scripts
Specificaties
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Part I: Cyber Network Security Concepts
1. Executive Summary
2. The Problems: Cyber Antipatterns
3. Enterprise Security Using the Zachman Framework
Part II: Cyber Network Security Hands-O
4. Network Administration for Security Professionals
5. Customizing BackTrack and Security Tools
6. Protocol Analysis and Network Programming
7. Reconnaissance, Vulnerability Assessment, and Cyber Testing
8. Penetration Testing
9. Cyber Network Defense Using Advanced Log Analysis
Part III: Cyber Network Application Domains
10. Cybersecurity for End Users, Social Media, and Virtual Worlds
11. Cybersecurity Essentials for Small Business
12. Large Enterprise Cybersecurity: Data Centers and Clouds
13. Healthcare Information Technology Security
14. Cyber Warfare: An Architecture for Deterrence
Glossary
Bibliography
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht