Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Building a secure infrastructure = t...
~
Banoth, Rajkumar.
Linked to FindBook
Google Book
Amazon
博客來
Building a secure infrastructure = the key procedures for system network security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Building a secure infrastructure/ by Rajkumar Banoth, Aruna Kranthi Godishala.
Reminder of title:
the key procedures for system network security /
Author:
Banoth, Rajkumar.
other author:
Godishala, Aruna Kranthi.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xlii, 626 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: The Danger & Fighters in the War Against Cybercrime -- Chapter 2: The Windows Operating System, Linux Overview -- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol -- Chapter 4: The Transport Layer, Network Services, Network Communication Devices -- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools -- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense -- Chapter 7: Access Control, Threat Intelligence -- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment -- Chapter 9: Technologies and Protocols, Network Security Data -- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-032-06439-4
ISBN:
9783032064394
Building a secure infrastructure = the key procedures for system network security /
Banoth, Rajkumar.
Building a secure infrastructure
the key procedures for system network security /[electronic resource] :by Rajkumar Banoth, Aruna Kranthi Godishala. - Cham :Springer Nature Switzerland :2025. - xlii, 626 p. :ill., digital ;24 cm.
Chapter 1: The Danger & Fighters in the War Against Cybercrime -- Chapter 2: The Windows Operating System, Linux Overview -- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol -- Chapter 4: The Transport Layer, Network Services, Network Communication Devices -- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools -- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense -- Chapter 7: Access Control, Threat Intelligence -- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment -- Chapter 9: Technologies and Protocols, Network Security Data -- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services. This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics. This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. It's also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills.
ISBN: 9783032064394
Standard No.: 10.1007/978-3-032-06439-4doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Building a secure infrastructure = the key procedures for system network security /
LDR
:04018nmm a2200325 a 4500
001
2422952
003
DE-He213
005
20260102120741.0
006
m d
007
cr nn 008maaau
008
260505s2025 sz s 0 eng d
020
$a
9783032064394
$q
(electronic bk.)
020
$a
9783032064387
$q
(paper)
024
7
$a
10.1007/978-3-032-06439-4
$2
doi
035
$a
978-3-032-06439-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.B219 2025
100
1
$a
Banoth, Rajkumar.
$3
3661563
245
1 0
$a
Building a secure infrastructure
$h
[electronic resource] :
$b
the key procedures for system network security /
$c
by Rajkumar Banoth, Aruna Kranthi Godishala.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xlii, 626 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Danger & Fighters in the War Against Cybercrime -- Chapter 2: The Windows Operating System, Linux Overview -- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol -- Chapter 4: The Transport Layer, Network Services, Network Communication Devices -- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools -- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense -- Chapter 7: Access Control, Threat Intelligence -- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment -- Chapter 9: Technologies and Protocols, Network Security Data -- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.
520
$a
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services. This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics. This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. It's also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Privacy.
$3
528582
700
1
$a
Godishala, Aruna Kranthi.
$3
3805160
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-032-06439-4
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9523450
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login