• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • 0
    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II by Handa, Anand; Negi, Rohit; Venkatesan, S.;

    Sorozatcím: River Publishers Series in Digital Security and Forensics;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 105.00
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        53 140 Ft (50 610 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 10 628 Ft off)
      • Discounted price 42 512 Ft (40 488 Ft + 5% áfa)

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Rövid leírás:

    This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

    Több

    Hosszú leírás:

    Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

    Több

    Tartalomjegyzék:

    PART ONE: Web Application Security


    1. OWASP G0rking ? Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner ? Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time


    PART TWO:  Malware Analysis


    3. Detecting Malware using Machine Learning 4. New Age Attack Vectors ? JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention


    PART THREE:  IDS


     7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network

    Több
    Mostanában megtekintett
    previous
    Foundations of Fuzzy Logic and Soft Computing: 12th International Fuzzy Systems Association World Congress, IFSA 2007, Cancun, Mexico, Junw 18-21, 2007, Proceedings

    Foundations of Fuzzy Logic and Soft Computing: 12th International Fuzzy Systems Association World Congress, IFSA 2007, Cancun, Mexico, Junw 18-21, 2007, Proceedings

    Melin, Patricia; Castillo, Oscar; Aguilar, Luis T.;(ed.)

    45 385 Ft

    Analysis and Design of Intelligent Systems Using Soft Computing Techniques

    Analysis and Design of Intelligent Systems Using Soft Computing Techniques

    Melin, Patricia; Castillo, Oscar; Ramírez, Eduardo G.;(ed.)

    90 774 Ft

    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

    Handa, Anand; Negi, Rohit; Venkatesan, S.;

    53 140 Ft

    Soft Computing for Intelligent Control and Mobile Robotics

    Soft Computing for Intelligent Control and Mobile Robotics

    Castillo, Oscar; Pedrycz, Witold; (ed.)

    68 079 Ft

    Algorithms For Dummies, 2nd Edition

    Algorithms For Dummies, 2nd Edition

    Mueller, J;

    11 635 Ft

    Serverless Web Applications with AWS Amplify: Build Full-Stack Serverless Applications Using Amazon Web Services

    Serverless Web Applications with AWS Amplify: Build Full-Stack Serverless Applications Using Amazon Web Services

    Paul, Akshat; Haldar, Mahesh;

    22 690 Ft

    Intelligent Automation and Computer Engineering

    Intelligent Automation and Computer Engineering

    Castillo, Oscar; Huang, He; (ed.)

    90 774 Ft

    next