Related Books
Language: en
Pages: 396
Pages: 396
Type: BOOK - Published: 2004 - Publisher: "O'Reilly Media, Inc."
Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy n
Language: en
Pages: 293
Pages: 293
Type: BOOK - Published: 2005 - Publisher: Sams Publishing
A thorough handbook on network risk assessment methodologies furnishes step-by-step training on how to assess the security of one's network computer system, cov
Language: en
Pages: 570
Pages: 570
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
Language: en
Pages: 243
Pages: 243
Type: BOOK - Published: 2018-08-31 - Publisher: Packt Publishing Ltd
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain han
Language: en
Pages: 304
Pages: 304
Type: BOOK - Published: 2016-07-25 - Publisher: John Wiley & Sons
A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of curre