Cargando…

Implementing enterprise cybersecurity with open-source software and standard architecture /

This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ab...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Handa, Anand (Editor ), Negi, Rohit (Editor ), Shukla, Sandeep K. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Gistrup, Denmark : River Publishers, [2021]
Colección:River Publishers series in security and digital forensics.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1264475220
003 OCoLC
005 20231027140348.0
006 m o d
007 cr c||||||||||
008 210821t20212021dk a ob 001 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d IEEEE  |d OCLCO  |d OCLCF  |d N$T  |d OCLCQ  |d OSU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCQ  |d SFB  |d TYFRS  |d UKAHL  |d OCLCQ 
020 |a 9788770224222  |q (electronic bk.) 
020 |a 8770224226  |q (electronic bk.) 
020 |a 9781003338512  |q (electronic bk.) 
020 |a 1003338518  |q (electronic bk.) 
020 |a 9781000794281  |q (electronic bk. : PDF) 
020 |a 1000794288  |q (electronic bk. : PDF) 
020 |a 9781000797442  |q (electronic bk. : EPUB) 
020 |a 1000797449  |q (electronic bk. : EPUB) 
020 |z 9788770224239  |q (hbk.) 
020 |z 8770224234  |q (hbk.) 
024 7 |a 10.1201/9781003338512  |2 doi 
035 |a (OCoLC)1264475220 
037 |a 9514762  |b IEEE 
037 |a 9781003338512  |b Taylor & Francis 
050 4 |a QA76.9.A25  |b I47 2021eb 
072 7 |a SCI  |x 024000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Implementing enterprise cybersecurity with open-source software and standard architecture /  |c editors, Anand Handa (C3i Center, Indian Institute of Technology, India), Rohit Negi (C3i Center, Indian Institute of Technology, India), Sandeep Kumar Shukla (C3i Center, Indian Institute of Technology, India). 
264 1 |a Gistrup, Denmark :  |b River Publishers,  |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource (xxiv, 253 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers series in security and digital forensics 
504 |a Includes bibliographical references (pages 245-250) and index. 
505 0 |a Honeynet -- Deploying a connected system of diverse honeypots using open-source tools / Sreeni Venugopal, Aditya Arun, Abhishek Ghildyal, Seshadri P.S., and Damandeep Singh -- Implementation of honeypot, NIDS and HIDS technologies in SOC environment / Ronald Dalbhanjan, Sudipta Chatterjee, Rajdeep Gogoi, Tanuj Pathak, and Shivam Sahay -- Leveraging research honeypots for generating credible threat intelligence and advanced threat analytics / Praveen Pathak, Mayank Raj Jaiswal, Mudit Kumar Gupta, Suraj Sharma, and Ranjit Singhnayak -- Collating threat intelligence for Zero Trust Future using open-source tools / Piyush John, Siva Suryanarayana Nittala, and Suresh Chandanapalli -- Malware analysis using machine learning / Charul Sharma, Kiran Desaraju, Krishna Tapasvi, Badrinarayan Ramamoorthy, and Krant Joshi -- Feature engineering and analysis towards temporally robust detection of Android malware / Sagar Jaiswal, Anand Handa, Nitesh Kumar, and Sandeep K. Shukla -- Use ModSecurity web application firewall to mitigate OWASP's Top 10 web application vulnerabilities / Lokesh Raju S., Santosh Sheshware, and Ruchit R. Patel -- Offensive security with Huntsman: a concurrent versatile malware / Souvik Haldar. 
520 |a This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. 
588 0 |a Print version record. 
545 0 |a Anand Handa, Rohit Negi, Sandeep Kumar Shukla 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer security. 
650 0 |a Open source software. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels libres. 
650 7 |a SCIENCE / Energy  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Open source software.  |2 fast  |0 (OCoLC)fst01046097 
700 1 |a Handa, Anand,  |e editor. 
700 1 |a Negi, Rohit,  |e editor. 
700 1 |a Shukla, Sandeep K.,  |e editor. 
776 0 8 |i Print version:  |t Implementing enterprise cybersecurity with open-source software and standard architecture.  |d Gistrup : River Publishers, [2021]  |z 9788770224239  |w (OCoLC)1263817765 
830 0 |a River Publishers series in security and digital forensics. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpIECOSSAA/toc  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH40652080 
938 |a YBP Library Services  |b YANK  |n 18126453 
938 |a EBSCOhost  |b EBSC  |n 3021799 
938 |a YBP Library Services  |b YANK  |n 18105824 
994 |a 92  |b IZTAP