Making Sense of Cybersecurity

Making Sense of Cybersecurity

Thomas Kranz
4.0 / 3.0
1 comment
이 책이 얼마나 마음에 드셨습니까?
파일의 품질이 어떻습니까?
책의 품질을 평가하시려면 책을 다운로드하시기 바랍니다
다운로드된 파일들의 품질이 어떻습니까?
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy.
In Making Sense of Cybersecurity you will learn how to
Develop and incrementally improve your own cybersecurity strategy
Detect rogue WiFi networks and safely browse on public WiFi
Protect against physical attacks utilizing USB devices or building access cards
Use the OODA loop and a hacker mindset to plan out your own attacks
Connect to and browse the Dark Web
Apply threat models to build, measure, and improve your defenses
Respond to a detected cyber attack and work through a security breach
Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
About the Technology
Someone is attacking your business right now. Understanding the threats, weaknesses, and attacks gives you the power to make better decisions about how to secure your systems. This book guides you through the concepts and basic skills you need to make sense of cybersecurity.
About the Book
Making Sense of Cybersecurity is a crystal-clear overview of common cyber threats written for business and technical readers with no background in security. You’ll explore the core ideas of cybersecurity so you can effectively talk shop, plan a security strategy, and spot your organization’s own weak points. By examining real-world security examples, you’ll learn how the bad guys think and how to handle live threats.
What's Inside
Develop and improve your cybersecurity strategy
Apply threat models to build, measure, and improve your defenses
Detect rogue WiFi networks and safely browse on public WiFi
Protect against physical attacks
카테고리:
년:
2022
판:
1 / converted
출판사:
Manning Publications Co.
언어:
english
페이지:
555
파일:
PDF, 8.28 MB
IPFS:
CID , CID Blake2b
english, 2022
온라인으로 읽기
로의 변환이 실행 중입니다
로의 변환이 실패되었습니다

주로 사용되는 용어