Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber defense mechanisms, 


Варианты приобретения
Цена: 28327.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания


Название:  Cyber defense mechanisms
ISBN: 9780367408831
Издательство: Taylor&Francis
Классификация:






ISBN-10: 036740883X
Обложка/Формат: Hardcover
Страницы: 216
Вес: 0.49 кг.
Дата издания: 09.09.2020
Серия: Artificial intelligence ai: elementary to advanced practices
Язык: English
Иллюстрации: 24 tables, black and white; 68 illustrations, black and white
Размер: 163 x 240 x 19
Читательская аудитория: Postgraduate, research & scholarly
Подзаголовок: Security, privacy, and challenges
Рейтинг:
Поставляется из: Европейский союз
Описание: This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.


Cyber Defense Mechanisms: Security, Privacy, and Challenges

Автор: Kumar Gautam, Saini Dinesh Kumar, Cuong Nguyen Ha Huy
Название: Cyber Defense Mechanisms: Security, Privacy, and Challenges
ISBN: 0367540967 ISBN-13(EAN): 9780367540968
Издательство: Taylor&Francis
Рейтинг:
Цена: 7042.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.    

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.    

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Hacking with Kali Linux: A Beginner`s Guide to learning all the basics of Kali Linux and Cyber Security: Includes Network Defense Strategies, P

Автор: Laurence Norman
Название: Hacking with Kali Linux: A Beginner`s Guide to learning all the basics of Kali Linux and Cyber Security: Includes Network Defense Strategies, P
ISBN: 1914203070 ISBN-13(EAN): 9781914203077
Издательство: Неизвестно
Рейтинг:
Цена: 2757.00 р.
Наличие на складе: Нет в наличии.

Описание: Are you interested in learning how to become a hacker?


If your answer is yes, then look no further. This book will take you down that road.


This book is going to teach you how hackers reason. Besides understanding the reasons why a hacker would target your computer, you will also get to know how they are able to do it and even how you can safeguard your systems, equipment, and network against hacking attacks. Keen readers will, by the end of this book, understand how their systems work, how to scan, and how to gain access to your computer.


The book has been structured in 11 chapters that will each teach you something new in matters hacking with Kali Linux.

Concepts have been simplified. By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside a number of advanced concepts in social engineering attack mechanisms. The book is truly a template for everyone who intends to understand hacking.


Additionally, you can expect the following from this book:


  • Introduction to Kali Linux
  • The Basics of Hacking and Using Kali Linux
  • Kali Tools
  • Penetration Testing
  • The process of ethical hacking
  • How to scanning devices in a network
  • What are cyber attacks
  • The basics of cybersecurity
  • Vulnerability assessments
  • Wireless network hacking
  • Analyzing and managing networks
  • Penetration Testing


Plenty of books about Hacking with Kali Linux do not cover crucial concepts in a satisfactory fashion. Let me say again that nothing has been left out by this book. Grab yourself a copy of this book, and you will get to discover interesting stuff about hacking using Kali Linux.


The book will provide you a platform to be better student, security administrator, or penetration tester.


You will also find out how you can protect your computer from all the hacker's attacks Scroll up and click BUY NOW button


Cyber Defense and Situational Awareness

Автор: Alexander Kott; Cliff Wang; Robert F. Erbacher
Название: Cyber Defense and Situational Awareness
ISBN: 3319380265 ISBN-13(EAN): 9783319380261
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission.

Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091463 ISBN-13(EAN): 9781801091466
Издательство: Неизвестно
Рейтинг:
Цена: 3717.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058100 ISBN-13(EAN): 9781914058103
Издательство: Неизвестно
Рейтинг:
Цена: 3309.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058119 ISBN-13(EAN): 9781914058110
Издательство: Неизвестно
Рейтинг:
Цена: 4827.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091471 ISBN-13(EAN): 9781801091473
Издательство: Неизвестно
Рейтинг:
Цена: 4959.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON

Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks

Автор: Gonzales Daniel, Harting Sarah, Adgie Mary Kate
Название: Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks
ISBN: 1977404480 ISBN-13(EAN): 9781977404480
Издательство: Неизвестно
Рейтинг:
Цена: 7230.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This report describes a way for the U.S. Department of Defense to better secure unclassified networks holding defense information-through the establishment of a cybersecurity program designed to strengthen the protections of these networks.

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058429 ISBN-13(EAN): 9781914058424
Издательство: Неизвестно
Рейтинг:
Цена: 3861.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! Now at $ 27.99 instead of $ 33.99 ★


Do you want to protect yourself from Cyber Security attacks?

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058437 ISBN-13(EAN): 9781914058431
Издательство: Неизвестно
Рейтинг:
Цена: 5102.00 р.
Наличие на складе: Нет в наличии.

Описание:

★ 55% OFF for Bookstores! Now at $ 36.99 instead of $ 44.99 ★


Do you want to protect yourself from Cyber Security attacks?

Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801444404 ISBN-13(EAN): 9781801444408
Издательство: Неизвестно
Рейтинг:
Цена: 6344.00 р.
Наличие на складе: Нет в наличии.

Описание:

55% OFF for bookstores!

What if my personal email account, bank account, or other accounts were compromised?

Your customers never stop to use this book!

Lubrication degradation mechanisms

Автор: Mathura, Sanya (strategic Reliability Solutions Ltd.)
Название: Lubrication degradation mechanisms
ISBN: 036760776X ISBN-13(EAN): 9780367607760
Издательство: Taylor&Francis
Рейтинг:
Цена: 7961.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Within the industry, people have struggled with lubricant degradation and its effects on their equipment. The purpose of this book is to help plant personnel to understand the reasons behind the degradation of their lubricant, determine ways to identify the onset of degradation, and reduce or eliminate degradation within their equipment.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия