×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure

(ebook) (audiobook) (audiobook) Książka w języku angielskim
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Sagar Rahalkar - okladka książki

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Sagar Rahalkar - okladka książki

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Sagar Rahalkar - audiobook MP3

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Sagar Rahalkar - audiobook CD

Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
254
Dostępne formaty:
     PDF
     ePub
     Mobi

Ebook (29,90 zł najniższa cena z 30 dni)

119,00 zł (-10%)
107,10 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

(29,90 zł najniższa cena z 30 dni)

Przenieś na półkę

Do przechowalni

The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.
Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism.
By the end of this book, you will be in a position to build a security framework fit for an organization.

Wybrane bestsellery

O autorze książki

Sagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a masters degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciations from senior officials of the police and defense organizations in India. Sagar has also been a reviewer and author for various books and online publications.

Sagar Rahalkar - pozostałe książki

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
107,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint