×







We sell 100% Genuine & New Books only!

Cybersecurity: Managing Systems, Conducting Testing, And Investigating Intrusions at Meripustak

Cybersecurity: Managing Systems, Conducting Testing, And Investigating Intrusions by Thomas J Mowbray, John Wiley

Books from same Author: Thomas J Mowbray

Books from same Publisher: John Wiley

Related Category: Author List / Publisher List


  • Price: ₹ 699.00/- [ 13.00% off ]

    Seller Price: ₹ 608.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Thomas J Mowbray
    PublisherJohn Wiley
    ISBN9788126549191
    Pages360
    BindingPaperback
    LanguageEnglish
    Publish YearMay 2014

    Description

    John Wiley Cybersecurity: Managing Systems, Conducting Testing, And Investigating Intrusions by Thomas J Mowbray

    This book is written to comply with the Comprehensive National Cyber Security Initiative #8: Cybersecurity Education, Cyber Network and will serve as a detailed, hands-on guide for anyone who wants to enter the hands-on security profession, including cybersecurity testing, IT testing/development and system/network administration. It will also serve as the text for a cybersecurity course at 2 and 4 year colleges and vocational cybersecurity education. The book is also a useful reference for working cybersecurity professionals for techniques such as advanced filtering with Wireshark and tcpdump, command line scripting, network penetration, tool customization, network administration and log analysis. This book covers basic network administration skills that everyone needs through to advanced command line scripting, tool customization and log analysis skills that are very useful in every shop, but few professionals have. The book goes deeper into wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line and tool customizations. In addition to the accompanying course syllabus, PowerPoint slides and test bank, the ancillaries include downloadable custom scripts for Advanced Log Analysis. The book can be used in tandem with the SEED Project lab exercises at which are free, open source security labs with a free instructor's manual. The book's exercises can be tested using the free version of BackTrack Linux.



    Book Successfully Added To Your Cart