Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity essentials = practical...
~
Cochran, Kodi A.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity essentials = practical tools for today's digital defenders /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity essentials/ by Kodi A. Cochran.
Reminder of title:
practical tools for today's digital defenders /
Author:
Cochran, Kodi A.
Published:
Berkeley, CA :Apress : : 2024.,
Description:
xxvii, 491 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1. Safeguarding the Digital Realm -- Chapter 2. The CIA Triad: Safeguarding Data in the Digital Realm -- Chapter 3. Information Gathering and Footprinting in Cybersecurity -- Chapter 4. Scanning and Enumeration -- Chapter 5. Securing Strength: A Comprehensive Guide to Vulnerability Assessment -- Chapter 6. Exploitation Unveiled: Navigating the Cybersecurity Offensive -- Chapter 7. After the Breach: Decoding Post-Exploitation Dynamics -- Chapter 8. Network Security: Safeguarding Digital Pathways -- Chapter 9. Securing thhe Airwaves: Essentials of Wireless Security -- Chapter 10. Fortifying the Front: Mastering Web Application Security -- Chapter 11. Security the Internet of Things and our Mobile World -- Chapter 12. Securing the Cloud: A Comprehensive Guide to Cloud Security -- Chapter 13. Social Engineering: Manipulating the Human Element -- Chapter 14. Incident Response, Business Continuity. and Disaster Recovery -- Chapter 15. Legal and Compliance Considerations in Cybersecurity.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures. -
Online resource:
https://doi.org/10.1007/979-8-8688-0432-8
ISBN:
9798868804328
Cybersecurity essentials = practical tools for today's digital defenders /
Cochran, Kodi A.
Cybersecurity essentials
practical tools for today's digital defenders /[electronic resource] :by Kodi A. Cochran. - Berkeley, CA :Apress :2024. - xxvii, 491 p. :ill., digital ;24 cm.
Chapter 1. Safeguarding the Digital Realm -- Chapter 2. The CIA Triad: Safeguarding Data in the Digital Realm -- Chapter 3. Information Gathering and Footprinting in Cybersecurity -- Chapter 4. Scanning and Enumeration -- Chapter 5. Securing Strength: A Comprehensive Guide to Vulnerability Assessment -- Chapter 6. Exploitation Unveiled: Navigating the Cybersecurity Offensive -- Chapter 7. After the Breach: Decoding Post-Exploitation Dynamics -- Chapter 8. Network Security: Safeguarding Digital Pathways -- Chapter 9. Securing thhe Airwaves: Essentials of Wireless Security -- Chapter 10. Fortifying the Front: Mastering Web Application Security -- Chapter 11. Security the Internet of Things and our Mobile World -- Chapter 12. Securing the Cloud: A Comprehensive Guide to Cloud Security -- Chapter 13. Social Engineering: Manipulating the Human Element -- Chapter 14. Incident Response, Business Continuity. and Disaster Recovery -- Chapter 15. Legal and Compliance Considerations in Cybersecurity.
Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your expertise or a newcomer eager to navigate the cybersecurity landscape, this guide serves as your trusted companion. Expect to gain a profound grasp of foundational concepts, illustrated through real-world examples and practical applications. Dive into the logical flow of CompTIA Pentest+ objectives and (ISC)2 SSCP & CCSP, aligning your learning with industry standards. Beyond theory, this guide empowers you with actionable tips and emerging trends, ensuring your knowledge remains current in the dynamic realm of cybersecurity. As you progress through each chapter, anticipate a hands-on exploration of offensive and defensive security, offering a pathway to certification from a vendor-neutral perspective. Ultimately, this guide is designed to not only enhance your cybersecurity skill set but to foster a holistic approach, making you adept at navigating the evolving cyber landscape with confidence and expertise. What You Will Learn Study a step-by-step guide to conducting vulnerability assessments Follow post-exploitation techniques for maintaining access Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures Review secure coding practices and the importance of web application security Explore mobile and IoT security best practices Review tools and practices for securing cloud environments Discover tips for recognizing and mitigating social engineering threats.
ISBN: 9798868804328
Standard No.: 10.1007/979-8-8688-0432-8doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .C634 2024
Dewey Class. No.: 005.8
Cybersecurity essentials = practical tools for today's digital defenders /
LDR
:03853nmm a2200349 a 4500
001
2375470
003
DE-He213
005
20240921131742.0
006
m d
007
cr nn 008maaau
008
241231s2024 cau s 0 eng d
020
$a
9798868804328
$q
(electronic bk.)
020
$a
9798868804311
$q
(paper)
024
7
$a
10.1007/979-8-8688-0432-8
$2
doi
035
$a
979-8-8688-0432-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.C634 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.C663 2024
100
1
$a
Cochran, Kodi A.
$3
3725014
245
1 0
$a
Cybersecurity essentials
$h
[electronic resource] :
$b
practical tools for today's digital defenders /
$c
by Kodi A. Cochran.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxvii, 491 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. Safeguarding the Digital Realm -- Chapter 2. The CIA Triad: Safeguarding Data in the Digital Realm -- Chapter 3. Information Gathering and Footprinting in Cybersecurity -- Chapter 4. Scanning and Enumeration -- Chapter 5. Securing Strength: A Comprehensive Guide to Vulnerability Assessment -- Chapter 6. Exploitation Unveiled: Navigating the Cybersecurity Offensive -- Chapter 7. After the Breach: Decoding Post-Exploitation Dynamics -- Chapter 8. Network Security: Safeguarding Digital Pathways -- Chapter 9. Securing thhe Airwaves: Essentials of Wireless Security -- Chapter 10. Fortifying the Front: Mastering Web Application Security -- Chapter 11. Security the Internet of Things and our Mobile World -- Chapter 12. Securing the Cloud: A Comprehensive Guide to Cloud Security -- Chapter 13. Social Engineering: Manipulating the Human Element -- Chapter 14. Incident Response, Business Continuity. and Disaster Recovery -- Chapter 15. Legal and Compliance Considerations in Cybersecurity.
520
$a
Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your expertise or a newcomer eager to navigate the cybersecurity landscape, this guide serves as your trusted companion. Expect to gain a profound grasp of foundational concepts, illustrated through real-world examples and practical applications. Dive into the logical flow of CompTIA Pentest+ objectives and (ISC)2 SSCP & CCSP, aligning your learning with industry standards. Beyond theory, this guide empowers you with actionable tips and emerging trends, ensuring your knowledge remains current in the dynamic realm of cybersecurity. As you progress through each chapter, anticipate a hands-on exploration of offensive and defensive security, offering a pathway to certification from a vendor-neutral perspective. Ultimately, this guide is designed to not only enhance your cybersecurity skill set but to foster a holistic approach, making you adept at navigating the evolving cyber landscape with confidence and expertise. What You Will Learn Study a step-by-step guide to conducting vulnerability assessments Follow post-exploitation techniques for maintaining access Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures Review secure coding practices and the importance of web application security Explore mobile and IoT security best practices Review tools and practices for securing cloud environments Discover tips for recognizing and mitigating social engineering threats.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0432-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9495919
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .C634 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login