Cargando…

Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mukherjee, Aditya
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1202459066
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 201031s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d N$T  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1200306695  |a 1202449485  |a 1305544537 
020 |a 9781789801057 
020 |a 1789801052 
020 |z 1789806291 
020 |z 9781789806298 
029 1 |a AU@  |b 000068857487 
029 1 |a AU@  |b 000073924846 
035 |a (OCoLC)1202459066  |z (OCoLC)1200306695  |z (OCoLC)1202449485  |z (OCoLC)1305544537 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mukherjee, Aditya. 
245 1 0 |a Network Security Strategies  |h [electronic resource] :  |b Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2020. 
300 |a 1 online resource (378 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Network Security Concepts, Threats, and Vulnerabilities -- Chapter 1: Network Security Concepts -- Technical requirements -- An overview of network security -- Network security concepts -- Network security components -- Network and system hardening -- Network segmentation -- Network choke-points -- Defense-in-Depth -- Due diligence and cyber resilience -- Soft targets -- Continuous monitoring and improvement -- Post-deployment review 
505 8 |a Network security architecture approach -- Planning and analysis -- Designing -- Building -- Testing -- Deployment -- Post-deployment -- Network security best practices and guidelines -- Network Operations Center overview -- Proper incident management -- Functional ticketing system and knowledge base -- Monitoring policy -- A well-defined investigation process -- Reporting and dashboards -- Escalation -- High availability and failover -- Assessing network security effectiveness -- Key attributes to be considered -- The action priority matrix -- Threat modeling -- Assessing the nature of threats 
505 8 |a STRIDE -- PASTA -- Trike -- VAST -- OCTAVE -- Summary -- Questions -- Further reading -- Chapter 2: Security for Cloud and Wireless Networks -- Technical requirements -- An introduction to secure cloud computing -- AWS' shared responsibility model -- Major cybersecurity challenges with the cloud -- Amazon Web Services (AWS) -- AWS security features -- Well-defined identity capabilities -- Traceability -- Defense in depth -- Automation of security best practices -- Continuous data protection -- Security event response -- Microsoft Azure security technologies -- The Zero Trust model 
505 8 |a Security layers -- Identity management using Azure -- Infrastructure protection using Azure -- Criticality of infrastructure -- Encryption -- Identifying and classifying data -- Encryption on Azure -- Network security -- Internet protection -- Virtual networks -- Network integrations -- CipherCloud -- Securing cloud computing -- Security threats -- Countermeasures -- Wireless network security -- Wi-Fi attack surface analysis and exploitation techniques -- Wi-Fi data collection and analysis -- Wi-Fi attack and exploitation techniques -- Best practices -- Security assessment approach 
505 8 |a Software-defined radio attacks -- Types of radio attacks -- Replay attacks -- Cryptanalysis attacks -- Reconnaissance attacks -- Mitigation techniques -- Summary -- Questions -- Further reading -- Chapter 3: Mitigating the Top Network Threats of 2020 -- Technical requirements -- The top 10 network attacks and how to fix them -- Phishing -- the familiar foe -- How to fix phishing threats -- Rogue applications and fake security alerts -- intimidation and imitation -- How to fix rogue applications and software threats -- Insider threats -- the enemy inside the gates -- How to fix insider threats 
500 |a Viruses and worms - a prevailing peril. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Mukherjee, Aditya  |t Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats  |d Birmingham : Packt Publishing, Limited,c2020 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789806298/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6371161 
938 |a YBP Library Services  |b YANK  |n 301622338 
938 |a EBSCOhost  |b EBSC  |n 2648388 
994 |a 92  |b IZTAP