|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
OR_on1202459066 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
201031s2020 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d YDX
|d N$T
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1200306695
|a 1202449485
|a 1305544537
|
020 |
|
|
|a 9781789801057
|
020 |
|
|
|a 1789801052
|
020 |
|
|
|z 1789806291
|
020 |
|
|
|z 9781789806298
|
029 |
1 |
|
|a AU@
|b 000068857487
|
029 |
1 |
|
|a AU@
|b 000073924846
|
035 |
|
|
|a (OCoLC)1202459066
|z (OCoLC)1200306695
|z (OCoLC)1202449485
|z (OCoLC)1305544537
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mukherjee, Aditya.
|
245 |
1 |
0 |
|a Network Security Strategies
|h [electronic resource] :
|b Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2020.
|
300 |
|
|
|a 1 online resource (378 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Network Security Concepts, Threats, and Vulnerabilities -- Chapter 1: Network Security Concepts -- Technical requirements -- An overview of network security -- Network security concepts -- Network security components -- Network and system hardening -- Network segmentation -- Network choke-points -- Defense-in-Depth -- Due diligence and cyber resilience -- Soft targets -- Continuous monitoring and improvement -- Post-deployment review
|
505 |
8 |
|
|a Network security architecture approach -- Planning and analysis -- Designing -- Building -- Testing -- Deployment -- Post-deployment -- Network security best practices and guidelines -- Network Operations Center overview -- Proper incident management -- Functional ticketing system and knowledge base -- Monitoring policy -- A well-defined investigation process -- Reporting and dashboards -- Escalation -- High availability and failover -- Assessing network security effectiveness -- Key attributes to be considered -- The action priority matrix -- Threat modeling -- Assessing the nature of threats
|
505 |
8 |
|
|a STRIDE -- PASTA -- Trike -- VAST -- OCTAVE -- Summary -- Questions -- Further reading -- Chapter 2: Security for Cloud and Wireless Networks -- Technical requirements -- An introduction to secure cloud computing -- AWS' shared responsibility model -- Major cybersecurity challenges with the cloud -- Amazon Web Services (AWS) -- AWS security features -- Well-defined identity capabilities -- Traceability -- Defense in depth -- Automation of security best practices -- Continuous data protection -- Security event response -- Microsoft Azure security technologies -- The Zero Trust model
|
505 |
8 |
|
|a Security layers -- Identity management using Azure -- Infrastructure protection using Azure -- Criticality of infrastructure -- Encryption -- Identifying and classifying data -- Encryption on Azure -- Network security -- Internet protection -- Virtual networks -- Network integrations -- CipherCloud -- Securing cloud computing -- Security threats -- Countermeasures -- Wireless network security -- Wi-Fi attack surface analysis and exploitation techniques -- Wi-Fi data collection and analysis -- Wi-Fi attack and exploitation techniques -- Best practices -- Security assessment approach
|
505 |
8 |
|
|a Software-defined radio attacks -- Types of radio attacks -- Replay attacks -- Cryptanalysis attacks -- Reconnaissance attacks -- Mitigation techniques -- Summary -- Questions -- Further reading -- Chapter 3: Mitigating the Top Network Threats of 2020 -- Technical requirements -- The top 10 network attacks and how to fix them -- Phishing -- the familiar foe -- How to fix phishing threats -- Rogue applications and fake security alerts -- intimidation and imitation -- How to fix rogue applications and software threats -- Insider threats -- the enemy inside the gates -- How to fix insider threats
|
500 |
|
|
|a Viruses and worms - a prevailing peril.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|a Mukherjee, Aditya
|t Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats
|d Birmingham : Packt Publishing, Limited,c2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781789806298/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6371161
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301622338
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2648388
|
994 |
|
|
|a 92
|b IZTAP
|