Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.

1145781189
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.

35.99 In Stock
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

eBook

$35.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.


Product Details

ISBN-13: 9781040215067
Publisher: CRC Press
Publication date: 11/22/2024
Series: Cyber Shorts
Sold by: Barnes & Noble
Format: eBook
Pages: 116
File size: 1 MB

About the Author

Mariya Ouaissa is currently an Assistant Professor in Cybersecurity and Networks at Faculty of Sciences Semlalia, Cadi Ayyad University, Marrakech, Morocco. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center.

Mariyam Ouaissa is currently an Assistant Professor in Networks and Systems at ENSA, Chouaib Doukkali University, El Jadida, Morocco. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa's research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control.

Table of Contents

1. Fundamentals of cybersecurity strategies 2. Offensive cybersecurity tools and technologies 3. Defensive cybersecurity tools and technologies 4. Threat modeling and risk management 5. Cybersecurity incident response and digital forensics 6. Use of AI and blockchain in cybersecurity

From the B&N Reads Blog

Customer Reviews