Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats (Record no. 5922)

MARC details
000 -LEADER
fixed length control field 03304nam a22001937a 4500
003 - CONTROL NUMBER IDENTIFIER
control field ZET-ke
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240203100247.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240203b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781789806298
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DlC
Modifying agency ZET-ke
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number .M85 2020
100 ## - MAIN ENTRY--PERSONAL NAME
Relator code Mukherjee, Aditya
245 ## - TITLE STATEMENT
Title Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats
Statement of responsibility, etc Mukherjee, Aditya
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Limited, Birmingham:
Name of publisher, distributor, etc Packt Publishing,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 372p.:
Other physical details ill.:
Dimensions 28cm.
500 ## - GENERAL NOTE
General note Includes indexes
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements<br/>An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation<br/>How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Classification part HF5548.37
Call number prefix HF5548.37
Call number suffix .M85 2020
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Date checked out Copy number Price effective from Koha item type
    Library of Congress Classification     Non-fiction Zetech Library - Mang'u Zetech Library - Mang'u General Stacks 19/01/2024 Purchase 9810   HF5548.37 .M85 2020 Z011531 03/02/2024   C1 03/02/2024 Books
    Library of Congress Classification     Non-fiction Zetech Library - TRC Zetech Library - TRC General Stacks 19/01/2024 Purchase 9811 1 HF5548.37 .M85 2020 Z011532 09/04/2024 03/04/2024 C2 03/02/2024 Books