Login

Mowbray, Thomas J.

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Mowbray, Thomas J. - Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions, ebook

56,45€

Ebook, ePUB with Adobe DRM
ISBN: 9781118849651
DRM Restrictions

Printing108 pages with an additional page accrued every 7 hours, capped at 108 pages
Copy to clipboard5 excerpts

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.

  • Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills
  • Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations
  • Delves into network administration for Windows, Linux, and VMware
  • Examines penetration testing, cyber investigations, firewall configuration, and security tool customization
  • Shares techniques for cybersecurity testing, planning, and reporting

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.

Keywords: Cybersecurity; what is cybersecurity; books on cybersecurity; cybersecurity books; book on cybersecurity; cybersecurity book; cybersecurity profession; how to enter the cybersecurity profession; profession of cybersecurity; cybersecurity methods; learning cybersecurity; understanding cybersecurity; cybersecurity explanation; explaining cybersecurity; cybersecurity strategies; strategies of cybersecurity; cybersecurity course; cybersecurity reference; reference on cybersecurity; cybersecurity testing; cybersecurity planning; cybersecurity reporting; cybersecurity threats; how to avoid cybersecurity threats; how to handle cybersecurity threats; Cyber security; what is cyber security; books on cyber security; cyber security books; book on cyber security; cyber security book; cyber security profession; how to enter the cyber security profession; profession of cyber security; cyber security methods; learning cyber security; understanding cyber security; cyber security explanation; explaining cyber security; cyber security strategies; strategies of cyber security; cyber security course; cyber security reference; reference on cyber security; cyber security testing; cyber security planning; cyber security reporting; cyber security threats; how to avoid cyber security threats; how to handle cyber security threats; identity management; risk management; incident management; security profession; entering the security profession; cyber investigations; security tools; online security tools

Author(s)
Publisher
John Wiley and Sons, Inc.
Publication year
2014
Language
en
Edition
1
Page amount
360 pages
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (ePUB)
9781118849651
Printed ISBN
9781118697115

Similar titles