Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
  • Afhalen na 1 uur in een winkel met voorraad
  • Gratis thuislevering in België vanaf € 30
  • Ruim aanbod met 7 miljoen producten
Wil je zeker zijn dat je cadeautjes op tijd onder de kerstboom liggen? Onze winkels ontvangen jou met open armen. Nu met extra openingsuren op zondag!
  • Afhalen na 1 uur in een winkel met voorraad
  • Gratis thuislevering in België vanaf € 30
  • Ruim aanbod met 7 miljoen producten

CyberSecurity

System administration guide for network configuration and cybersecurity. Advance your knowledge of the Linux operating system

Robert Davis, Michael Smith
Paperback | Engels
€ 33,95
+ 67 punten
Uitvoering
Levertermijn 1 à 4 weken
Eenvoudig bestellen
Veilig betalen
Gratis thuislevering vanaf € 30 (via bpost)
Gratis levering in je Standaard Boekhandel

Omschrijving

Cybersecurity


The truth is: If cybersecurity is one of the careers you are looking forward to you should learn Linux to be the best in your profession. Linux is extremely important to security.


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux.

Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers. Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux plays a very important role in the job profile of a cybersecurity professional. There are special Linux distributions like Kali Linux which are used by the cybersecurity professionals to carry out in-depth penetration testing. It can also be used for assessing vulnerability as well as providing forensic analysis after a security breach has taken place.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Linux

- How networking command line works

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Would you like to know more?





Specificaties

Betrokkenen

Auteur(s):
Uitgeverij:

Inhoud

Aantal bladzijden:
484
Taal:
Engels

Eigenschappen

Productcode (EAN):
9781801541060
Verschijningsdatum:
15/12/2020
Uitvoering:
Paperback
Formaat:
Trade paperback (VS)
Afmetingen:
152 mm x 229 mm
Gewicht:
639 g
Standaard Boekhandel

Alleen bij Standaard Boekhandel

+ 67 punten op je klantenkaart van Standaard Boekhandel
E-BOOK ACTIE

Tot meer dan 50% korting

op een selectie e-books
E-BOOK ACTIE
E-book kortingen
Standaard Boekhandel

Beoordelingen

We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.