Information security: defense and offense
39.99 €
Out of stock
Books on information security (IS) are mainly divided into two groups: some contain mostly normative information and little information about the technical implementation of threats and protection against them, while others describe only technical aspects (the "...through the eyes of a hacker" series).
This book is now in its third edition, offering the reader a deep dive into the practical aspects of implementing specific attacks and defenses. Both up-to-date technical information and tips on how to organize the information security process with relevant examples are presented. Topics covered include: attacks on wireless devices; cloud security; vulnerability identification; intrusion detection and prevention; leak mitigation; an overview of encryption methods; a description of the Kali Linux package; and much more. The publication is intended for system administrators and users of small and medium-sized networks protecting corporate resources.
This book is now in its third edition, offering the reader a deep dive into the practical aspects of implementing specific attacks and defenses. Both up-to-date technical information and tips on how to organize the information security process with relevant examples are presented. Topics covered include: attacks on wireless devices; cloud security; vulnerability identification; intrusion detection and prevention; leak mitigation; an overview of encryption methods; a description of the Kali Linux package; and much more. The publication is intended for system administrators and users of small and medium-sized networks protecting corporate resources.
See also:
- All books by the publisher
- All books by the author
You might be interested:

Information technology
Moving to the Cloud: A Practical Guide to Cloud Computing for Scientists and IT Professionals
14.99 €