Cargando…

Cybersecurity : a Comprehensive Guide to Getting Started in Cybersecurity.

Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ozkaya, Erdal
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1105332935
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 190622s2019 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d CHVBK  |d OCLCQ  |d OCLCO  |d YDX  |d OCLCF  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1103217640 
020 |a 9781789806939 
020 |a 1789806933 
029 1 |a CHNEW  |b 001059038 
029 1 |a CHVBK  |b 569756413 
029 1 |a AU@  |b 000071377344 
035 |a (OCoLC)1105332935  |z (OCoLC)1103217640 
050 4 |a QA76.9.A25  |b .O953 2019 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Ozkaya, Erdal. 
245 1 0 |a Cybersecurity :  |b a Comprehensive Guide to Getting Started in Cybersecurity. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2019. 
300 |a 1 online resource (384 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems 
505 8 |a Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale 
505 8 |a Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts 
505 8 |a Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration 
505 8 |a System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant 
500 |a Social characteristics of hackers 
520 |a Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Cybersecurity (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFGHyd3kxRcTd4q9BMYvBP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ozkaya, Erdal.  |t Cybersecurity: the Beginner's Guide.  |d Birmingham : Packt Publishing, Limited, ©2019  |z 9781789616194 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5781046  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5781046 
938 |a YBP Library Services  |b YANK  |n 300569078 
994 |a 92  |b IZTAP