|
Showing 1 - 3 of
3 matches in All Departments
This book presents a unique, step-by-step approach for monitoring,
detecting, analyzing and mitigating complex network cyber threats.
It includes updated processes in response to asymmetric threats, as
well as descriptions of the current tools to mitigate cyber
threats. Featuring comprehensive computer science material relating
to a complete network baseline with the characterization hardware
and software configuration, the book also identifies potential
emerging cyber threats and the vulnerabilities of the network
architecture to provide students with a guide to responding to
threats. The book is intended for undergraduate and graduate
college students who are unfamiliar with the cyber paradigm and
processes in responding to attacks.
This book presents a unique, step-by-step approach for monitoring,
detecting, analyzing and mitigating complex network cyber threats.
It includes updated processes in response to asymmetric threats, as
well as descriptions of the current tools to mitigate cyber
threats. Featuring comprehensive computer science material relating
to a complete network baseline with the characterization hardware
and software configuration, the book also identifies potential
emerging cyber threats and the vulnerabilities of the network
architecture to provide students with a guide to responding to
threats. The book is intended for undergraduate and graduate
college students who are unfamiliar with the cyber paradigm and
processes in responding to attacks.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.