Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Negi, Rohit; Shukla, Sandeep K.; Handa, Anand; Venkatesan, S.
River Publishers
07/2023
246
Dura
Inglês
9788770227957
15 a 20 dias
Descrição não disponível.
PART ONE: Web Application Security
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cyber defense strategies;security operation center;malware detection techniques;open-source security tools;intrusion detection methods;endpoint protection solutions;cloud-based malware monitoring
PART ONE: Web Application Security
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
1. OWASP G0rking - Exploiting the Hidden Aspects of Google's Search Capabilities 2. OSS Known Vulnerability Scanner - Helping Software Developers Detect Third Party Dependency Vulnerabilities in Real Time
PART TWO: Malware Analysis
3. Detecting Malware using Machine Learning 4. New Age Attack Vectors - JPEG Images Machine Learning Based Solution for the Detection of Malicious JPEG Images 5. Live Monitoring of Malware Attacks on Cloud using a Windows Agent-Based Solution 6. Malware Too Needs Attention
PART THREE: IDS
7. Implementation of Intrusion Detection System and Deception Technologies using Open-Source Tools for Small Business 8. Attack Vector Analysis with New Benchmark 9. Stealpot Honeypot Network
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.