Books
|
Buy Now
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Loot Price: R3,052
Discovery Miles 30 520
|
|
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Series: River Publishers Series in Digital Security and Forensics
Expected to ship within 12 - 17 working days
|
Cyber security is one of the most critical problems faced by
enterprises, government organizations, education institutes, small
and medium scale businesses, and medical institutions today.
Creating a cyber security posture through proper cyber security
architecture, deployment of cyber defense tools, and building a
security operation center are critical for all such organizations
given the preponderance of cyber threats. However, cyber defense
tools are expensive, and many small and medium-scale business
houses cannot procure these tools within their budgets. Even those
business houses that manage to procure them cannot use them
effectively because of the lack of human resources and the
knowledge of the standard enterprise security architecture. In
2020, the C3i Center at the Indian Institute of Technology Kanpur
developed a professional certification course where IT
professionals from various organizations go through rigorous
six-month long training in cyber defense. During their training,
groups within the cohort collaborate on team projects to develop
cybersecurity solutions for problems such as malware analysis,
threat intelligence collection, endpoint detection and protection,
network intrusion detection, developing security incidents, event
management systems, etc. All these projects leverage open-source
tools, and code from various sources, and hence can be also
constructed by others if the recipe to construct such tools is
known. It is therefore beneficial if we put these recipes out in
the form of book chapters such that small and medium scale
businesses can create these tools based on open-source components,
easily following the content of the chapters. In 2021, we published
the first volume of this series based on the projects done by
cohort 1 of the course. This volume, second in the series has new
recipes and tool development expertise based on the projects done
by cohort 3 of this training program. This volume consists of nine
chapters that describe experience and know-how of projects in
malware analysis, web application security, intrusion detection
system, and honeypot in sufficient detail so they can be recreated
by anyone looking to develop home grown solutions to defend
themselves from cyber-attacks.
General
Imprint: |
River Publishers
|
Country of origin: |
Denmark |
Series: |
River Publishers Series in Digital Security and Forensics |
Release date: |
July 2023 |
First published: |
2023 |
Authors: |
Anand Handa
• Rohit Negi
• S Venkatesan
• Sandeep K Shukla
|
Dimensions: |
234 x 156mm (L x W) |
Pages: |
272 |
ISBN-13: |
978-87-7022-795-7 |
Categories: |
Books
|
LSN: |
87-7022-795-0 |
Barcode: |
9788770227957 |
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.