Ruehl

Implementing Enterprise Cyber Security with Open-Source Software and Standard Ar

Description: Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II by Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla Estimated delivery 3-12 business days Format Hardcover Condition Brand New Description This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks. Publisher Description Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks. Author Biography Anand Handa is a senior research engineer with the C3i Center at the Indian Institute of Technology Kanpur. His research interests are in the intersection of machine learning and cybersecurity. His role at C3i involves working on projects having malware analysis, memory forensics and intrusion detection systems as a significant component.Rohit Negi is the lead engineer and chief security architect of the C3i Center – a center for cybersecurity and cyber defense of critical infrastructures at the Indian Institute of Technology Kanpur. His research is in the field of cybersecurity of cyber-physical systems.S. Venkatesan is an Associate Professor at the Department of Information Technology at the Indian Institute of Information Technology Allahabad (IIITA). He heads IIITAs C3iHub IoT Security Lab and is a member of the Network Security and Cryptography (NSC) Group. He has authored several research papers published in reputed journals and presented at conferences. His research interests include network security, cloud computing, social network privacy, mobile agent security, applied cryptography, and blockchain.Sandeep K. Shukla is a professor of Computer Science and Engineering with the Indian Institute of Technology. He is an IEEE Fellow, ACM distinguished scientist, and subject matter expert in Cybersecurity of cyber-physical systems and blockchain technology. He is a recipient of various prestigious honours, and he serves as a joint coordinator for the C3I Centre and the National Blockchain Project at IIT Kanpur, India. Details ISBN 8770227950 ISBN-13 9788770227957 Title Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II Author Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla Format Hardcover Year 2023 Pages 246 Publisher River Publishers GE_Item_ID:143138198; About Us Grand Eagle Retail is the ideal place for all your shopping needs! With fast shipping, low prices, friendly service and over 1,000,000 in stock items - you're bound to find what you want, at a price you'll love! Shipping & Delivery Times Shipping is FREE to any address in USA. Please view eBay estimated delivery times at the top of the listing. Deliveries are made by either USPS or Courier. We are unable to deliver faster than stated. International deliveries will take 1-6 weeks. NOTE: We are unable to offer combined shipping for multiple items purchased. This is because our items are shipped from different locations. Returns If you wish to return an item, please consult our Returns Policy as below: Please contact Customer Services and request "Return Authorisation" before you send your item back to us. Unauthorised returns will not be accepted. Returns must be postmarked within 4 business days of authorisation and must be in resellable condition. Returns are shipped at the customer's risk. We cannot take responsibility for items which are lost or damaged in transit. For purchases where a shipping charge was paid, there will be no refund of the original shipping charge. Additional Questions If you have any questions please feel free to Contact Us. Categories Baby Books Electronics Fashion Games Health & Beauty Home, Garden & Pets Movies Music Sports & Outdoors Toys

Price: 161.46 USD

Location: Fairfield, Ohio

End Time: 2024-11-09T04:08:06.000Z

Shipping Cost: 0 USD

Product Images

Implementing Enterprise Cyber Security with Open-Source Software and Standard Ar

Item Specifics

Restocking Fee: No

Return shipping will be paid by: Buyer

All returns accepted: Returns Accepted

Item must be returned within: 30 Days

Refund will be given as: Money Back

ISBN-13: 9788770227957

Book Title: Implementing Enterprise Cyber Security with Open-Source Software

Number of Pages: 246 Pages

Publication Name: Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

Language: English

Publisher: River Publishers

Publication Year: 2023

Subject: Security / General, Economics / General, Forensic Science, Cybernetics

Type: Textbook

Subject Area: Law, Computers, Business & Economics

Author: Anand Handa, S. Venkatesan, Rohit Negi, Sandeep K. Shukla

Item Length: 9.2 in

Item Width: 6.1 in

Series: River Publishers Series in Digital Security and Forensics Ser.

Format: Hardcover

Recommended

Implementing Enterprise Risk Management: From Methods to Application - VERY GOOD
Implementing Enterprise Risk Management: From Methods to Application - VERY GOOD

$43.77

View Details
Sustainable Enterprise Value Creation: Implementing Stakeholder Capitalism
Sustainable Enterprise Value Creation: Implementing Stakeholder Capitalism

$36.18

View Details
Implementing Homeland Security for Enterprise IT, Erbschloe, Michael, 9781555583
Implementing Homeland Security for Enterprise IT, Erbschloe, Michael, 9781555583

$25.00

View Details
Implementing Enterprise Risk Management : From Methods to Applications by James
Implementing Enterprise Risk Management : From Methods to Applications by James

$49.99

View Details
Implementing Ariba and SAP Fieldglass, Justin Ashlock (
Implementing Ariba and SAP Fieldglass, Justin Ashlock (

$11.39

View Details
Implementing Enterprise Risk Management: Case Studies and Best Practices by John
Implementing Enterprise Risk Management: Case Studies and Best Practices by John

$143.89

View Details
Implementing Enterprise Risk - Hardcover, by Fraser John R. - Acceptable
Implementing Enterprise Risk - Hardcover, by Fraser John R. - Acceptable

$48.69

View Details
Making Enterprise Risk Management Pay Off: How Leading Companies Implement...
Making Enterprise Risk Management Pay Off: How Leading Companies Implement...

$6.34

View Details
CCNP Enterprise Certification Study Guide: Implementing and Operating Cis - GOOD
CCNP Enterprise Certification Study Guide: Implementing and Operating Cis - GOOD

$31.52

View Details
The Non-Techie Guide to Enterprise Software: Buying, Implementing, and Under...
The Non-Techie Guide to Enterprise Software: Buying, Implementing, and Under...

$11.15

View Details