Implementing enterprise cybersecurity with open-source software and standard architecture

This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ab...

Full description

Saved in:
Bibliographic Details
Other Authors: Handa, Anand, (Editor), Negi, Rohit, (Editor), Shukla, Sandeep K., (Editor)
Format: eBook
Language: English
Published: Gistrup, Denmark : River Publishers, [2021]
Series: River Publishers series in security and digital forensics.
Subjects:
ISBN: 9788770224222
8770224226
9781003338512
1003338518
9781000794281
1000794288
9781000797442
1000797449
9788770224239
8770224234
Physical Description: 1 online resource (xxiv, 253 pages) : illustrations (some color)

Cover

Table of contents

LEADER 04232cam a2200529 i 4500
001 kn-on1264475220
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 210821t20212021dk a ob 001 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d IEEEE  |d OCLCO  |d OCLCF  |d N$T  |d OCLCQ  |d OSU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCQ  |d SFB  |d TYFRS  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB 
020 |a 9788770224222  |q (electronic bk.) 
020 |a 8770224226  |q (electronic bk.) 
020 |a 9781003338512  |q (electronic bk.) 
020 |a 1003338518  |q (electronic bk.) 
020 |a 9781000794281  |q (electronic bk. : PDF) 
020 |a 1000794288  |q (electronic bk. : PDF) 
020 |a 9781000797442  |q (electronic bk. : EPUB) 
020 |a 1000797449  |q (electronic bk. : EPUB) 
020 |z 9788770224239  |q (hbk.) 
020 |z 8770224234  |q (hbk.) 
024 7 |a 10.1201/9781003338512  |2 doi 
035 |a (OCoLC)1264475220 
245 0 0 |a Implementing enterprise cybersecurity with open-source software and standard architecture /  |c editors, Anand Handa (C3i Center, Indian Institute of Technology, India), Rohit Negi (C3i Center, Indian Institute of Technology, India), Sandeep Kumar Shukla (C3i Center, Indian Institute of Technology, India). 
264 1 |a Gistrup, Denmark :  |b River Publishers,  |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource (xxiv, 253 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers series in security and digital forensics 
504 |a Includes bibliographical references (pages 245-250) and index. 
505 0 |a Honeynet -- Deploying a connected system of diverse honeypots using open-source tools / Sreeni Venugopal, Aditya Arun, Abhishek Ghildyal, Seshadri P.S., and Damandeep Singh -- Implementation of honeypot, NIDS and HIDS technologies in SOC environment / Ronald Dalbhanjan, Sudipta Chatterjee, Rajdeep Gogoi, Tanuj Pathak, and Shivam Sahay -- Leveraging research honeypots for generating credible threat intelligence and advanced threat analytics / Praveen Pathak, Mayank Raj Jaiswal, Mudit Kumar Gupta, Suraj Sharma, and Ranjit Singhnayak -- Collating threat intelligence for Zero Trust Future using open-source tools / Piyush John, Siva Suryanarayana Nittala, and Suresh Chandanapalli -- Malware analysis using machine learning / Charul Sharma, Kiran Desaraju, Krishna Tapasvi, Badrinarayan Ramamoorthy, and Krant Joshi -- Feature engineering and analysis towards temporally robust detection of Android malware / Sagar Jaiswal, Anand Handa, Nitesh Kumar, and Sandeep K. Shukla -- Use ModSecurity web application firewall to mitigate OWASP's Top 10 web application vulnerabilities / Lokesh Raju S., Santosh Sheshware, and Ruchit R. Patel -- Offensive security with Huntsman: a concurrent versatile malware / Souvik Haldar. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer security. 
650 0 |a Open source software. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Handa, Anand,  |e editor. 
700 1 |a Negi, Rohit,  |e editor. 
700 1 |a Shukla, Sandeep K.,  |e editor. 
776 0 8 |i Print version:  |t Implementing enterprise cybersecurity with open-source software and standard architecture.  |d Gistrup : River Publishers, [2021]  |z 9788770224239  |w (OCoLC)1263817765 
830 0 |a River Publishers series in security and digital forensics. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpIECOSSAA/implementing-enterprise-cybersecurity?kpromoter=marc  |y Full text