Cybersecurity : managing systems, conducting testing, and investigating intrusions / Thomas J Mowbray.
By: Mowbray, Thomas J [author]
Publisher: Indianapolis, IN : John Wiley and Sons, [2014]Copyright date: c2014Edition: First editionDescription: xxiv, 336 pages : illustrations ; 23 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781118697115 (pbk. : alk. paper); 1118697111 (pbk. : alk. paper)Subject(s): Computer crimes -- Prevention. | Information technology -- Security measures. | Penetration testing (Computer security). | Computer networks -- Security measures. | Computer security. DDC classification: 352.379Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 352.379 M871 2014 (Browse shelf) | Available | CITU-CL-45949 |
Browsing COLLEGE LIBRARY Shelves , Shelving location: SUBJECT REFERENCE Close shelf browser
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
352 M691 1966 State and local government : politics and processes / | 352.283098 B919 1999 Beyond the center : decentralizing the state / | 352.34 G443 1998 Strategic management for government agencies : an institutional approach for developing and transition economies / | 352.379 M871 2014 Cybersecurity : managing systems, conducting testing, and investigating intrusions / | 352.380285 R246 2012 Public administration and information technology / | 352.4238091724 H273 1999 Information systems for government fiscal management / | 352.60973 P96 2007 Public personnel administration and labor relations / |
Includes bibliographical references and index.
Introduction xix Part I Cyber Network Security Concepts 1 Chapter 1 Executive Summary 3 Chapter 2 The Problems: Cyber Antipatterns 15 Chapter 3 Enterprise Security Using the Zachman Framework 37 Part II Cyber Network Security Hands-On 59 Chapter 4 Network Administration for Security Professionals 61 Chapter 5 Customizing BackTrack and Security Tools 103 Chapter 6 Protocol Analysis and Network Programming 115 Chapter 7 Reconnaissance, Vulnerability Assessment, and Cyber Testing 139 Chapter 8 Penetration Testing 165 Chapter 9 Cyber Network Defense Using Advanced Log Analysis 189 Part III Cyber Network Application Domains 217 Chapter 10 Cybersecurity for End Users, Social Media, and Virtual Worlds 219 Chapter 11 Cybersecurity Essentials for Small Business 233 Chapter 12 Large Enterprise Cybersecurity: Data Centers and Clouds 241 Chapter 13 Healthcare Information Technology Security 269 Chapter 14 Cyber Warfare: An Architecture for Deterrence 277 Glossary 307 Bibliography 317 Index 323
There are no comments for this item.