Cybersecurity for Beginners: How to Defend Against Hackers & Malware
Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?
Do you want to know what tools and techniques are used in Cybersecurity?
Do you want to know what daily tasks you must do to protect your Infrastructure?

If the answer is yes to the above questions, this book is for you!
1132212412
Cybersecurity for Beginners: How to Defend Against Hackers & Malware
Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?
Do you want to know what tools and techniques are used in Cybersecurity?
Do you want to know what daily tasks you must do to protect your Infrastructure?

If the answer is yes to the above questions, this book is for you!
34.95 In Stock
Cybersecurity for Beginners: How to Defend Against Hackers & Malware

Cybersecurity for Beginners: How to Defend Against Hackers & Malware

by Attila Kovacs
Cybersecurity for Beginners: How to Defend Against Hackers & Malware

Cybersecurity for Beginners: How to Defend Against Hackers & Malware

by Attila Kovacs

Hardcover

$34.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?
Do you want to know what tools and techniques are used in Cybersecurity?
Do you want to know what daily tasks you must do to protect your Infrastructure?

If the answer is yes to the above questions, this book is for you!

Product Details

ISBN-13: 9781839380051
Publisher: Sabi Shepherd Ltd
Publication date: 08/09/2019
Series: How to Defend Against Hackers & Malware , #3
Pages: 122
Product dimensions: 6.00(w) x 9.00(h) x 0.31(d)

Table of Contents

Chapter 1 - Data Analytics Overview

Chapter 2 – How to Measure Cybersecurity

Chapter 3 – How to use Trend Analysis to Prevent Intrusion

Chapter 4 – What is Data Aggregation and Correlation

Chapter 5 – The Guide to Defense in Depth

Chapter 6 - What Breach Detection Tools Should be Used

Chapter 7 – Intrusion Prevention Systems

Chapter 8 - Software & Hardware Based Firewalls

Chapter 9 – Enhanced Mitigation Experience Toolkit

Chapter 10 - Web Application Firewalls VS Proxys

Chapter 11 - Pen Testing To Identify Security Flows

Chapter 12 – Guidelines On Pen Test Procedures

Chapter 13 – How Reverse Engineering Works

Chapter 14 – What Risk Evaluation Steps to Follow

Chapter 15 - The Essentials of Security Frameworks

Chapter 16 – Policy Framework Procedures

Chapter 17 – Control Framework Procedures

Chapter 18 – Cybersecurity Procedures

Chapter 19 - Quality Controls & Verification Processes

From the B&N Reads Blog

Customer Reviews