|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1264475220 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr c|||||||||| |
008 |
210821t20212021dk a ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d IEEEE
|d OCLCO
|d OCLCF
|d N$T
|d OCLCQ
|d OSU
|d OCLCQ
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCQ
|d SFB
|d TYFRS
|d UKAHL
|d OCLCQ
|
020 |
|
|
|a 9788770224222
|q (electronic bk.)
|
020 |
|
|
|a 8770224226
|q (electronic bk.)
|
020 |
|
|
|a 9781003338512
|q (electronic bk.)
|
020 |
|
|
|a 1003338518
|q (electronic bk.)
|
020 |
|
|
|a 9781000794281
|q (electronic bk. : PDF)
|
020 |
|
|
|a 1000794288
|q (electronic bk. : PDF)
|
020 |
|
|
|a 9781000797442
|q (electronic bk. : EPUB)
|
020 |
|
|
|a 1000797449
|q (electronic bk. : EPUB)
|
020 |
|
|
|z 9788770224239
|q (hbk.)
|
020 |
|
|
|z 8770224234
|q (hbk.)
|
024 |
7 |
|
|a 10.1201/9781003338512
|2 doi
|
035 |
|
|
|a (OCoLC)1264475220
|
037 |
|
|
|a 9514762
|b IEEE
|
037 |
|
|
|a 9781003338512
|b Taylor & Francis
|
050 |
|
4 |
|a QA76.9.A25
|b I47 2021eb
|
072 |
|
7 |
|a SCI
|x 024000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Implementing enterprise cybersecurity with open-source software and standard architecture /
|c editors, Anand Handa (C3i Center, Indian Institute of Technology, India), Rohit Negi (C3i Center, Indian Institute of Technology, India), Sandeep Kumar Shukla (C3i Center, Indian Institute of Technology, India).
|
264 |
|
1 |
|a Gistrup, Denmark :
|b River Publishers,
|c [2021]
|
264 |
|
4 |
|c ©2021
|
300 |
|
|
|a 1 online resource (xxiv, 253 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers series in security and digital forensics
|
504 |
|
|
|a Includes bibliographical references (pages 245-250) and index.
|
505 |
0 |
|
|a Honeynet -- Deploying a connected system of diverse honeypots using open-source tools / Sreeni Venugopal, Aditya Arun, Abhishek Ghildyal, Seshadri P.S., and Damandeep Singh -- Implementation of honeypot, NIDS and HIDS technologies in SOC environment / Ronald Dalbhanjan, Sudipta Chatterjee, Rajdeep Gogoi, Tanuj Pathak, and Shivam Sahay -- Leveraging research honeypots for generating credible threat intelligence and advanced threat analytics / Praveen Pathak, Mayank Raj Jaiswal, Mudit Kumar Gupta, Suraj Sharma, and Ranjit Singhnayak -- Collating threat intelligence for Zero Trust Future using open-source tools / Piyush John, Siva Suryanarayana Nittala, and Suresh Chandanapalli -- Malware analysis using machine learning / Charul Sharma, Kiran Desaraju, Krishna Tapasvi, Badrinarayan Ramamoorthy, and Krant Joshi -- Feature engineering and analysis towards temporally robust detection of Android malware / Sagar Jaiswal, Anand Handa, Nitesh Kumar, and Sandeep K. Shukla -- Use ModSecurity web application firewall to mitigate OWASP's Top 10 web application vulnerabilities / Lokesh Raju S., Santosh Sheshware, and Ruchit R. Patel -- Offensive security with Huntsman: a concurrent versatile malware / Souvik Haldar.
|
520 |
|
|
|a This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment.
|
588 |
0 |
|
|a Print version record.
|
545 |
0 |
|
|a Anand Handa, Rohit Negi, Sandeep Kumar Shukla
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
7 |
|a SCIENCE / Energy
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Open source software.
|2 fast
|0 (OCoLC)fst01046097
|
700 |
1 |
|
|a Handa, Anand,
|e editor.
|
700 |
1 |
|
|a Negi, Rohit,
|e editor.
|
700 |
1 |
|
|a Shukla, Sandeep K.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Implementing enterprise cybersecurity with open-source software and standard architecture.
|d Gistrup : River Publishers, [2021]
|z 9788770224239
|w (OCoLC)1263817765
|
830 |
|
0 |
|a River Publishers series in security and digital forensics.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpIECOSSAA/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40652080
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18126453
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3021799
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18105824
|
994 |
|
|
|a 92
|b IZTAP
|