Amazon cover image
Image from Amazon.com

Mastering Advanced Excel

By: Publication details: BPB Publications 2023 New DelhiDescription: 564ISBN:
  • 9789355518651
Subject(s): DDC classification:
  • 001.64 ARO
Summary: Description Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks, Intellectual Property thefts, and others. This book will help and guide the readers through the process of creating and integrating a secure cyber ecosystem into their digital business operations. In addition, it will help readers safeguard and defend the IT security infrastructure by implementing the numerous tried-and-tested procedures outlined in this book. The tactics covered in this book provide a moderate introduction to defensive and offensive strategies, and they are supported by recent and popular use-cases on cyberattacks. The book provides a well-illustrated introduction to a set of methods for protecting the system from vulnerabilities and expert-led measures for initiating various urgent steps after an attack has been detected. What you will learn ● Adopt MITRE ATT&CK and MITRE framework and examine NIST, ITIL, and ISMS recommendations. ● Understand all forms of vulnerabilities, application security mechanisms, and deployment strategies. ● Know-how of Cloud Security Posture Management (CSPM), Threat Intelligence, and modern SIEM systems. ● Learn security gap analysis, Cybersecurity planning, and strategy monitoring. Who this book is for Professionals in IT security, Cybersecurity, and other related fields working to improve the organization's overall security will find this book a valuable resource and companion. This book will guide young professionals who are planning to enter Cybersecurity with the right set of skills and knowledge. Source: https://www.amazon.in/Modern-Cybersecurity-Strategies-Enterprises-Enterprise/dp/9355513135/ref=sr_1_1?crid=3US95B3WEVGU5&dib=eyJ2IjoiMSJ9.FBCsRsgr4DJcVRKL20Sttw.LKOCzPxLMxaeYrU952X4T5NRCslauigo7uuScStc4t4&dib_tag=se&keywords=9789355513137&qid=1722520988&sprefix=9789355510655%2Caps%2C260&sr=8-1
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Book Book Main Library Information Technology Reference book 001.64 ARO (Browse shelf(Opens below)) Available 119451

Description
Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks, Intellectual Property thefts, and others.

This book will help and guide the readers through the process of creating and integrating a secure cyber ecosystem into their digital business operations. In addition, it will help readers safeguard and defend the IT security infrastructure by implementing the numerous tried-and-tested procedures outlined in this book.

The tactics covered in this book provide a moderate introduction to defensive and offensive strategies, and they are supported by recent and popular use-cases on cyberattacks. The book provides a well-illustrated introduction to a set of methods for protecting the system from vulnerabilities and expert-led measures for initiating various urgent steps after an attack has been detected.
What you will learn
● Adopt MITRE ATT&CK and MITRE framework and examine NIST, ITIL, and ISMS recommendations.
● Understand all forms of vulnerabilities, application security mechanisms, and deployment strategies.
● Know-how of Cloud Security Posture Management (CSPM), Threat Intelligence, and modern SIEM systems.
● Learn security gap analysis, Cybersecurity planning, and strategy monitoring.
Who this book is for
Professionals in IT security, Cybersecurity, and other related fields working to improve the organization's overall security will find this book a valuable resource and companion.
This book will guide young professionals who are planning to enter Cybersecurity with the right set of skills and knowledge.

Source: https://www.amazon.in/Modern-Cybersecurity-Strategies-Enterprises-Enterprise/dp/9355513135/ref=sr_1_1?crid=3US95B3WEVGU5&dib=eyJ2IjoiMSJ9.FBCsRsgr4DJcVRKL20Sttw.LKOCzPxLMxaeYrU952X4T5NRCslauigo7uuScStc4t4&dib_tag=se&keywords=9789355513137&qid=1722520988&sprefix=9789355510655%2Caps%2C260&sr=8-1

There are no comments on this title.

to post a comment.

Powered by Koha