Implementing enterprise cybersecurity with open-source software and standard architecture
This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ab...
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Gistrup, Denmark :
River Publishers,
[2021]
|
Series: | River Publishers series in security and digital forensics.
|
Subjects: | |
ISBN: | 9788770224222 8770224226 9781003338512 1003338518 9781000794281 1000794288 9781000797442 1000797449 9788770224239 8770224234 |
Physical Description: | 1 online resource (xxiv, 253 pages) : illustrations (some color) |
LEADER | 04232cam a2200529 i 4500 | ||
---|---|---|---|
001 | kn-on1264475220 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 210821t20212021dk a ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d IEEEE |d OCLCO |d OCLCF |d N$T |d OCLCQ |d OSU |d OCLCQ |d OCLCO |d OCLCQ |d YDX |d OCLCQ |d SFB |d TYFRS |d UKAHL |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
020 | |a 9788770224222 |q (electronic bk.) | ||
020 | |a 8770224226 |q (electronic bk.) | ||
020 | |a 9781003338512 |q (electronic bk.) | ||
020 | |a 1003338518 |q (electronic bk.) | ||
020 | |a 9781000794281 |q (electronic bk. : PDF) | ||
020 | |a 1000794288 |q (electronic bk. : PDF) | ||
020 | |a 9781000797442 |q (electronic bk. : EPUB) | ||
020 | |a 1000797449 |q (electronic bk. : EPUB) | ||
020 | |z 9788770224239 |q (hbk.) | ||
020 | |z 8770224234 |q (hbk.) | ||
024 | 7 | |a 10.1201/9781003338512 |2 doi | |
035 | |a (OCoLC)1264475220 | ||
245 | 0 | 0 | |a Implementing enterprise cybersecurity with open-source software and standard architecture / |c editors, Anand Handa (C3i Center, Indian Institute of Technology, India), Rohit Negi (C3i Center, Indian Institute of Technology, India), Sandeep Kumar Shukla (C3i Center, Indian Institute of Technology, India). |
264 | 1 | |a Gistrup, Denmark : |b River Publishers, |c [2021] | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (xxiv, 253 pages) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers series in security and digital forensics | |
504 | |a Includes bibliographical references (pages 245-250) and index. | ||
505 | 0 | |a Honeynet -- Deploying a connected system of diverse honeypots using open-source tools / Sreeni Venugopal, Aditya Arun, Abhishek Ghildyal, Seshadri P.S., and Damandeep Singh -- Implementation of honeypot, NIDS and HIDS technologies in SOC environment / Ronald Dalbhanjan, Sudipta Chatterjee, Rajdeep Gogoi, Tanuj Pathak, and Shivam Sahay -- Leveraging research honeypots for generating credible threat intelligence and advanced threat analytics / Praveen Pathak, Mayank Raj Jaiswal, Mudit Kumar Gupta, Suraj Sharma, and Ranjit Singhnayak -- Collating threat intelligence for Zero Trust Future using open-source tools / Piyush John, Siva Suryanarayana Nittala, and Suresh Chandanapalli -- Malware analysis using machine learning / Charul Sharma, Kiran Desaraju, Krishna Tapasvi, Badrinarayan Ramamoorthy, and Krant Joshi -- Feature engineering and analysis towards temporally robust detection of Android malware / Sagar Jaiswal, Anand Handa, Nitesh Kumar, and Sandeep K. Shukla -- Use ModSecurity web application firewall to mitigate OWASP's Top 10 web application vulnerabilities / Lokesh Raju S., Santosh Sheshware, and Ruchit R. Patel -- Offensive security with Huntsman: a concurrent versatile malware / Souvik Haldar. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Open source software. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Handa, Anand, |e editor. | |
700 | 1 | |a Negi, Rohit, |e editor. | |
700 | 1 | |a Shukla, Sandeep K., |e editor. | |
776 | 0 | 8 | |i Print version: |t Implementing enterprise cybersecurity with open-source software and standard architecture. |d Gistrup : River Publishers, [2021] |z 9788770224239 |w (OCoLC)1263817765 |
830 | 0 | |a River Publishers series in security and digital forensics. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpIECOSSAA/implementing-enterprise-cybersecurity?kpromoter=marc |y Full text |