Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (eBook, ePUB)
106,95 €
106,95 €
inkl. MwSt.
Sofort per Download lieferbar
53 °P sammeln
106,95 €
Als Download kaufen
106,95 €
inkl. MwSt.
Sofort per Download lieferbar
53 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
106,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
53 °P sammeln
Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- Anand HandaImplementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (eBook, PDF)106,95 €
- Social Networking as a Criminal Enterprise (eBook, ePUB)91,95 €
- Orlando LopezEU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP (eBook, ePUB)213,95 €
- William J. BuchananIntroduction to Security and Network Forensics (eBook, ePUB)57,95 €
- Artificial Intelligence and Blockchain in Digital Forensics (eBook, ePUB)106,95 €
- R. T. WyantRisk Management of Less Lethal Options (eBook, ePUB)63,95 €
- AI Based Advancements in Biometrics and its Applications (eBook, ePUB)54,95 €
-
-
-
This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 272
- Erscheinungstermin: 27. Juli 2023
- Englisch
- ISBN-13: 9781000922394
- Artikelnr.: 68118160
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 272
- Erscheinungstermin: 27. Juli 2023
- Englisch
- ISBN-13: 9781000922394
- Artikelnr.: 68118160
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Anand Handa is a senior research engineer with the C3i Center at the Indian Institute of Technology Kanpur. His research interests are in the intersection of machine learning and cybersecurity. His role at C3i involves working on projects having malware analysis, memory forensics and intrusion detection systems as a significant component.
Rohit Negi is the lead engineer and chief security architect of the C3i Center - a center for cybersecurity and cyber defense of critical infrastructures at the Indian Institute of Technology Kanpur. His research is in the field of cybersecurity of cyber-physical systems.
S. Venkatesan is an Associate Professor at the Department of Information Technology at the Indian Institute of Information Technology Allahabad (IIITA). He heads IIITA's C3iHub IoT Security Lab and is a member of the Network Security and Cryptography (NSC) Group. He has authored several research papers published in reputed journals and presented at conferences. His research interests include network security, cloud computing, social network privacy, mobile agent security, applied cryptography, and blockchain.
Sandeep K. Shukla is a professor of Computer Science and Engineering with the Indian Institute of Technology. He is an IEEE Fellow, ACM distinguished scientist, and subject matter expert in Cybersecurity of cyber-physical systems and blockchain technology. He is a recipient of various prestigious honours, and he serves as a joint coordinator for the C3I Centre and the National Blockchain Project at IIT Kanpur, India.
Rohit Negi is the lead engineer and chief security architect of the C3i Center - a center for cybersecurity and cyber defense of critical infrastructures at the Indian Institute of Technology Kanpur. His research is in the field of cybersecurity of cyber-physical systems.
S. Venkatesan is an Associate Professor at the Department of Information Technology at the Indian Institute of Information Technology Allahabad (IIITA). He heads IIITA's C3iHub IoT Security Lab and is a member of the Network Security and Cryptography (NSC) Group. He has authored several research papers published in reputed journals and presented at conferences. His research interests include network security, cloud computing, social network privacy, mobile agent security, applied cryptography, and blockchain.
Sandeep K. Shukla is a professor of Computer Science and Engineering with the Indian Institute of Technology. He is an IEEE Fellow, ACM distinguished scientist, and subject matter expert in Cybersecurity of cyber-physical systems and blockchain technology. He is a recipient of various prestigious honours, and he serves as a joint coordinator for the C3I Centre and the National Blockchain Project at IIT Kanpur, India.
PART ONE: Web Application Security
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search
Capabilities 2. OSS Known Vulnerability Scanner - Helping Software
Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors -
JPEG Images Machine Learning Based Solution for the Detection of Malicious
JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows
Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies
using Open-Source Tools for Small Business 8. Attack Vector Analysis with
New Benchmark 9. Stealpot Honeypot Network
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search
Capabilities 2. OSS Known Vulnerability Scanner - Helping Software
Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors -
JPEG Images Machine Learning Based Solution for the Detection of Malicious
JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows
Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies
using Open-Source Tools for Small Business 8. Attack Vector Analysis with
New Benchmark 9. Stealpot Honeypot Network
PART ONE: Web Application Security
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search
Capabilities 2. OSS Known Vulnerability Scanner - Helping Software
Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors -
JPEG Images Machine Learning Based Solution for the Detection of Malicious
JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows
Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies
using Open-Source Tools for Small Business 8. Attack Vector Analysis with
New Benchmark 9. Stealpot Honeypot Network
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search
Capabilities 2. OSS Known Vulnerability Scanner - Helping Software
Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors -
JPEG Images Machine Learning Based Solution for the Detection of Malicious
JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows
Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies
using Open-Source Tools for Small Business 8. Attack Vector Analysis with
New Benchmark 9. Stealpot Honeypot Network