Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats (Record no. 5922)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03304nam a22001937a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | ZET-ke |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240203100247.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240203b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781789806298 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DlC |
Modifying agency | ZET-ke |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HF5548.37 |
Item number | .M85 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Relator code | Mukherjee, Aditya |
245 ## - TITLE STATEMENT | |
Title | Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats |
Statement of responsibility, etc | Mukherjee, Aditya |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Limited, Birmingham: |
Name of publisher, distributor, etc | Packt Publishing, |
Date of publication, distribution, etc | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | ix, 372p.: |
Other physical details | ill.: |
Dimensions | 28cm. |
500 ## - GENERAL NOTE | |
General note | Includes indexes |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements<br/>An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation<br/>How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Classification part | HF5548.37 |
Call number prefix | HF5548.37 |
Call number suffix | .M85 2020 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Date checked out | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Non-fiction | Zetech Library - Mang'u | Zetech Library - Mang'u | General Stacks | 19/01/2024 | Purchase | 9810 | HF5548.37 .M85 2020 | Z011531 | 03/02/2024 | C1 | 03/02/2024 | Books | ||||||
Library of Congress Classification | Non-fiction | Zetech Library - TRC | Zetech Library - TRC | General Stacks | 19/01/2024 | Purchase | 9811 | 1 | HF5548.37 .M85 2020 | Z011532 | 09/04/2024 | 03/04/2024 | C2 | 03/02/2024 | Books |