0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II: Anand Handa, Rohit Negi,... Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Anand Handa, Rohit Negi, S Venkatesan, Sandeep K Shukla
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Antennas and Propagation…
Edmond Thor Hardcover R3,262 R2,952 Discovery Miles 29 520
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R420 R388 Discovery Miles 3 880
Intraseasonal Variability in the…
William K. -M Lau, Duane E. Waliser Hardcover R5,259 Discovery Miles 52 590
LTE-Advanced - 3GPP Solution for…
H Holma Hardcover R2,313 Discovery Miles 23 130
Advances in Geophysics, Volume 57
Lars Nielsen Hardcover R5,079 Discovery Miles 50 790
Communications Handbook: Volume II
Akira Hanako Hardcover R3,155 R2,858 Discovery Miles 28 580
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R724 Discovery Miles 7 240
CAD & Office Integration - OLE for…
Intergraph GmbH Hardcover R1,411 Discovery Miles 14 110
Fractured Vuggy Carbonate Reservoir…
Jun Yao, Zhao-Qin Huang Hardcover R3,956 Discovery Miles 39 560
RF-MEMS Technology for High-Performance…
Jacopo Iannacci Hardcover R3,260 Discovery Miles 32 600

 

Partners