
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Series: River Publishers Series in Digital Security and Forensics;
- Publisher's listprice GBP 105.00
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 10 628 Ft off)
- Discounted price 42 512 Ft (40 488 Ft + 5% VAT)
53 140 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher River Publishers
- Date of Publication 27 July 2023
- ISBN 9788770227957
- Binding Hardback
- No. of pages272 pages
- Size 234x156 mm
- Weight 453 g
- Language English
- Illustrations 13 Illustrations, black & white; 68 Illustrations, color; 7 Halftones, black & white; 58 Halftones, color; 6 Line drawings, black & white; 10 Line drawings, color; 14 Tables, black & white 524
Categories
Short description:
This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
MoreLong description:
Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
MoreTable of Contents:
PART ONE: Web Application Security
1. OWASP G0rking ? Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner ? Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors ? JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
More
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Subcribe now and receive a favourable price.
Subscribe
53 140 HUF