EUR 54,23
Quantità: 5 disponibili
Aggiungi al carrelloCondizione: new.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Lingua: Inglese
Editore: Springer Nature Switzerland, 2025
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Lingua: Inglese
Editore: Springer Nature Switzerland, 2025
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 57,85
Quantità: 1 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Da: Revaluation Books, Exeter, Regno Unito
EUR 64,82
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 450 pages. 9.26x6.11 inches. In Stock.
EUR 49,49
Quantità: 5 disponibili
Aggiungi al carrelloCondizione: new.
Lingua: Inglese
Editore: Springer, Springer International Publishing Jan 2026, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: Wegmann1855, Zwiesel, Germania
EUR 64,19
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Chapter 1: The Danger & Fighters in the War Against Cybercrime.- Chapter 2: The Windows Operating System, Linux Overview.- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol.- Chapter 4: The Transport Layer, Network Services, Network Communication Devices.- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools.- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense.- Chapter 7: Access Control, Threat Intelligence.- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment.- Chapter 9: Technologies and Protocols, Network Security Data.- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: CitiRetail, Stevenage, Regno Unito
EUR 65,41
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: preigu, Osnabrück, Germania
EUR 56,75
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Building a Secure Infrastructure | The key Procedures for System Network Security | Rajkumar Banoth (u. a.) | Taschenbuch | xlii | Englisch | 2026 | Springer | EAN 9783032064387 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Lingua: Inglese
Editore: Springer, Springer International Publishing, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 64,19
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 109,55
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Lingua: Inglese
Editore: Springer, Springer International Publishing Jan 2026, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Germania
EUR 64,19
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills. 668 pp. Englisch.
Lingua: Inglese
Editore: Springer, Springer International Publishing Jan 2026, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 64,19
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills. 668 pp. Englisch.
Lingua: Inglese
Editore: Springer, Springer International Publishing Jan 2026, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 64,19
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 668 pp. Englisch.