• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • 0
    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II by Handa, Anand; Negi, Rohit; Venkatesan, S.;

    Series: River Publishers Series in Digital Security and Forensics;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 105.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        53 140 Ft (50 610 Ft + 5% VAT)
      • Discount 20% (cc. 10 628 Ft off)
      • Discounted price 42 512 Ft (40 488 Ft + 5% VAT)

    53 140 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher River Publishers
    • Date of Publication 27 July 2023

    • ISBN 9788770227957
    • Binding Hardback
    • No. of pages272 pages
    • Size 234x156 mm
    • Weight 453 g
    • Language English
    • Illustrations 13 Illustrations, black & white; 68 Illustrations, color; 7 Halftones, black & white; 58 Halftones, color; 6 Line drawings, black & white; 10 Line drawings, color; 14 Tables, black & white
    • 524

    Categories

    Short description:

    This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

    More

    Long description:

    Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

    More

    Table of Contents:

    PART ONE: Web Application Security


    1. OWASP G0rking ? Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner ? Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time


    PART TWO:  Malware Analysis


    3. Detecting Malware using Machine Learning 4. New Age Attack Vectors ? JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention


    PART THREE:  IDS


     7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network

    More
    Recently viewed
    previous
    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Handa, Anand; Negi, Rohit; Venkatesan, S.;

    53 140 HUF

    next