Cybersecurity Essentials : Practical Tools for Today's Digital Defenders (First Edition. 2024. xxvii, 491 S. XXVII, 491 p. 2 illus. 235 mm)

個数:

Cybersecurity Essentials : Practical Tools for Today's Digital Defenders (First Edition. 2024. xxvii, 491 S. XXVII, 491 p. 2 illus. 235 mm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 250 p.
  • 言語 ENG
  • 商品コード 9798868804311

Full Description

Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your expertise or a newcomer eager to navigate the cybersecurity landscape, this guide serves as your trusted companion.

Expect to gain a profound grasp of foundational concepts, illustrated through real-world examples and practical applications. Dive into the logical flow of CompTIA Pentest+ objectives and (ISC)2 SSCP & CCSP, aligning your learning with industry standards. Beyond theory, this guide empowers you with actionable tips and emerging trends, ensuring your knowledge remains current in the dynamic realm of cybersecurity.

As you progress through each chapter, anticipate a hands-on exploration of offensive and defensive security, offering a pathway to certification from a vendor-neutral perspective. Ultimately, this guide is designed to not only enhance your cybersecurity skill set but to foster a holistic approach, making you adept at navigating the evolving cyber landscape with confidence and expertise.

 

What You Will Learn

Study a step-by-step guide to conducting vulnerability assessments
Follow post-exploitation techniques for maintaining access
Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures
Review secure coding practices and the importance of web application security
Explore mobile and IoT security best practices
Review tools and practices for securing cloud environments
Discover tips for recognizing and mitigating social engineering threats

 

Who This Book Is For

Anyone interested in cybersecurity: recent graduates, IT professionals transitioning into security, veterans, and those who are self taught. One of the largest motivating factors is that there are several certifications—this book will greatly improve the reader's chance of obtaining.

Contents

Chapter 1. Safeguarding the Digital Realm.- Chapter 2. The CIA Triad: Safeguarding Data in the Digital Realm.- Chapter 3. Information Gathering and Footprinting in Cybersecurity.- Chapter 4. Scanning and Enumeration.- Chapter 5. Securing Strength: A Comprehensive Guide to Vulnerability Assessment.- Chapter 6. Exploitation Unveiled: Navigating the Cybersecurity Offensive.- Chapter 7. After the Breach: Decoding Post-Exploitation Dynamics.- Chapter 8. Network Security: Safeguarding Digital Pathways.- Chapter 9. Securing thhe Airwaves:  Essentials of Wireless Security.- Chapter 10. Fortifying the Front: Mastering Web Application Security.- Chapter 11. Security the Internet of Things and our Mobile World.- Chapter 12. Securing the Cloud: A Comprehensive Guide to Cloud Security.- Chapter 13. Social Engineering: Manipulating the Human Element.- Chapter 14. Incident Response, Business Continuity. and Disaster Recovery.-Chapter 15. Legal and Compliance Considerations in Cybersecurity.

最近チェックした商品