語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cracking the cybersecurity interview : = essential strategies and learn concepts /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cracking the cybersecurity interview :/ Karl Gilbert, Sayanta Sen.
其他題名:
essential strategies and learn concepts /
作者:
Gilbert, Karl.
其他作者:
Sen, Sayanta,
面頁冊數:
1 online resource (551 pages)
標題:
COMPUTERS / Security / Cryptography & Encryption. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000628.html
ISBN:
9789355516701
Cracking the cybersecurity interview : = essential strategies and learn concepts /
Gilbert, Karl.
Cracking the cybersecurity interview :
essential strategies and learn concepts /Karl Gilbert, Sayanta Sen. - 1 online resource (551 pages)
Includes bibliographical references and index.
Cracking the cybersecurity interview : essential strategies and learn concepts -- Dedication -- About the Authors -- About the Reviewers -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: UNIX, Linux, and Windows -- Chapter 2: Networking, Routing, and Protocols -- Chapter 3: Security of DBMS and SQL -- Chapter 4: Threat Modeling, Pentesting and Secure Coding -- Chapter 5: Application Security -- Chapter 6: Network Security -- Chapter 7: Cloud Security -- Chapter 8: Red and Blue Teaming Activities -- Chapter 9: Security in SDLC -- Chapter 10: Security in CI/CD -- Chapter 11: Firewalls, Endpoint Protections, Anti- Malware, and UTMs -- Chapter 12: Security Information and Event Management -- Chapter 13: Spreading Awareness -- Chapter 14: Law and Compliance in Cyberspace -- Chapter 15: Python, Bash, and PowerShell Proficiency -- Index.
Access restricted to authorized users and institutions.
This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream job in this dynamic field. This beginner-friendly cybersecurity guide helps you safely navigate the digital world. The reader will also learn about operating systems like Windows, Linux, and UNIX, as well as secure server management. We will also understand networking with TCP/IP and packet analysis, master SQL queries, and fortify databases against threats like SQL injection. Discover proactive security with threat modeling, penetration testing, and secure coding. Protect web apps from OWASP/SANS vulnerabilities and secure networks with pentesting and firewalls. Finally, explore cloud security best practices using AWS to identify misconfigurations and strengthen your cloud setup. The book will prepare you for cybersecurity job interviews, helping you start a successful career in information security. The book provides essential techniques and knowledge to confidently tackle interview challenges and secure a rewarding role in the cybersecurity field.
Mode of access: World Wide Web.
ISBN: 9789355516701Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 004.2
Cracking the cybersecurity interview : = essential strategies and learn concepts /
LDR
:03168nam a2200289 i 4500
001
1157329
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516701
020
$a
9789355518941
035
$a
BPB0000628
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
004.2
100
1
$a
Gilbert, Karl.
$3
1483936
245
1 0
$a
Cracking the cybersecurity interview :
$b
essential strategies and learn concepts /
$c
Karl Gilbert, Sayanta Sen.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (551 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Cracking the cybersecurity interview : essential strategies and learn concepts -- Dedication -- About the Authors -- About the Reviewers -- Acknowledgements -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: UNIX, Linux, and Windows -- Chapter 2: Networking, Routing, and Protocols -- Chapter 3: Security of DBMS and SQL -- Chapter 4: Threat Modeling, Pentesting and Secure Coding -- Chapter 5: Application Security -- Chapter 6: Network Security -- Chapter 7: Cloud Security -- Chapter 8: Red and Blue Teaming Activities -- Chapter 9: Security in SDLC -- Chapter 10: Security in CI/CD -- Chapter 11: Firewalls, Endpoint Protections, Anti- Malware, and UTMs -- Chapter 12: Security Information and Event Management -- Chapter 13: Spreading Awareness -- Chapter 14: Law and Compliance in Cyberspace -- Chapter 15: Python, Bash, and PowerShell Proficiency -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream job in this dynamic field. This beginner-friendly cybersecurity guide helps you safely navigate the digital world. The reader will also learn about operating systems like Windows, Linux, and UNIX, as well as secure server management. We will also understand networking with TCP/IP and packet analysis, master SQL queries, and fortify databases against threats like SQL injection. Discover proactive security with threat modeling, penetration testing, and secure coding. Protect web apps from OWASP/SANS vulnerabilities and secure networks with pentesting and firewalls. Finally, explore cloud security best practices using AWS to identify misconfigurations and strengthen your cloud setup. The book will prepare you for cybersecurity job interviews, helping you start a successful career in information security. The book provides essential techniques and knowledge to confidently tackle interview challenges and secure a rewarding role in the cybersecurity field.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Sen, Sayanta,
$e
author
$3
1483937
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000628.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入