Building a secure infrastructure = t...
Banoth, Rajkumar.

Linked to FindBook      Google Book      Amazon      博客來     
  • Building a secure infrastructure = the key procedures for system network security /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Building a secure infrastructure/ by Rajkumar Banoth, Aruna Kranthi Godishala.
    Reminder of title: the key procedures for system network security /
    Author: Banoth, Rajkumar.
    other author: Godishala, Aruna Kranthi.
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xlii, 626 p. :ill., digital ;24 cm.
    [NT 15003449]: Chapter 1: The Danger & Fighters in the War Against Cybercrime -- Chapter 2: The Windows Operating System, Linux Overview -- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol -- Chapter 4: The Transport Layer, Network Services, Network Communication Devices -- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools -- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense -- Chapter 7: Access Control, Threat Intelligence -- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment -- Chapter 9: Technologies and Protocols, Network Security Data -- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.
    Contained By: Springer Nature eBook
    Subject: Computer networks - Security measures. -
    Online resource: https://doi.org/10.1007/978-3-032-06439-4
    ISBN: 9783032064394
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login