Search preferences
Vai alla pagina principale dei risultati di ricerca

Filtri di ricerca

Tipo di articolo

  • Tutti i tipi di prodotto 
  • Libri (14)
  • Riviste e Giornali (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fumetti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Spartiti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Arte, Stampe e Poster (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fotografie (Nessun altro risultato corrispondente a questo perfezionamento)
  • Mappe (Nessun altro risultato corrispondente a questo perfezionamento)
  • Manoscritti e Collezionismo cartaceo (Nessun altro risultato corrispondente a questo perfezionamento)

Condizioni Maggiori informazioni

  • Nuovo (14)
  • Come nuovo, Ottimo o Quasi ottimo (Nessun altro risultato corrispondente a questo perfezionamento)
  • Molto buono o Buono (Nessun altro risultato corrispondente a questo perfezionamento)
  • Discreto o Mediocre (Nessun altro risultato corrispondente a questo perfezionamento)
  • Come descritto (Nessun altro risultato corrispondente a questo perfezionamento)

Legatura

  • Tutte 
  • Rilegato (Nessun altro risultato corrispondente a questo perfezionamento)
  • Brossura (14)

Ulteriori caratteristiche

  • Prima ed. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Copia autograf. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Sovracoperta (Nessun altro risultato corrispondente a questo perfezionamento)
  • Con foto (6)
  • Non Print on Demand (11)

Lingua (1)

Prezzo

  • Qualsiasi prezzo 
  • Inferiore a EUR 20 (Nessun altro risultato corrispondente a questo perfezionamento)
  • EUR 20 a EUR 40 (Nessun altro risultato corrispondente a questo perfezionamento)
  • Superiore a EUR 40 
Fascia di prezzo personalizzata (EUR)

Paese del venditore

  • Banoth, Rajkumar

    Lingua: Inglese

    Editore: Springer, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Brook Bookstore On Demand, Napoli, NA, Italia

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 54,23

    Spedizione EUR 8,00
    Spedito da Italia a U.S.A.

    Quantità: 5 disponibili

    Aggiungi al carrello

    Condizione: new.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer Nature Switzerland AG, Cham, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Grand Eagle Retail, Bensenville, IL, U.S.A.

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 65,16

    Spedizione gratuita
    Spedito in U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Paperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer Nature Switzerland, 2025

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: PBShop.store US, Wood Dale, IL, U.S.A.

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 65,17

    Spedizione gratuita
    Spedito in U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer Nature Switzerland, 2025

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: PBShop.store UK, Fairford, GLOS, Regno Unito

    Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 57,85

    Spedizione EUR 6,72
    Spedito da Regno Unito a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.

  • Banoth, Rajkumar (Author)/ Godishala, Aruna Kranthi (Author)

    Lingua: Inglese

    Editore: Springer, 2025

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Revaluation Books, Exeter, Regno Unito

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 64,82

    Spedizione EUR 14,31
    Spedito da Regno Unito a U.S.A.

    Quantità: 2 disponibili

    Aggiungi al carrello

    Paperback. Condizione: Brand New. 450 pages. 9.26x6.11 inches. In Stock.

  • Banoth, Rajkumar

    Lingua: Inglese

    Editore: Springer, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Brook Bookstore, Milano, MI, Italia

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 49,49

    Spedizione EUR 27,99
    Spedito da Italia a U.S.A.

    Quantità: 5 disponibili

    Aggiungi al carrello

    Condizione: new.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer, Springer International Publishing Jan 2026, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Wegmann1855, Zwiesel, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 64,19

    Spedizione EUR 25,95
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Neuware -Chapter 1: The Danger & Fighters in the War Against Cybercrime.- Chapter 2: The Windows Operating System, Linux Overview.- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol.- Chapter 4: The Transport Layer, Network Services, Network Communication Devices.- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools.- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense.- Chapter 7: Access Control, Threat Intelligence.- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment.- Chapter 9: Technologies and Protocols, Network Security Data.- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer Nature Switzerland AG, Cham, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: CitiRetail, Stevenage, Regno Unito

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 65,41

    Spedizione EUR 42,34
    Spedito da Regno Unito a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Paperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.

  • Rajkumar Banoth (u. a.)

    Lingua: Inglese

    Editore: Springer, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: preigu, Osnabrück, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 56,75

    Spedizione EUR 70,00
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Building a Secure Infrastructure | The key Procedures for System Network Security | Rajkumar Banoth (u. a.) | Taschenbuch | xlii | Englisch | 2026 | Springer | EAN 9783032064387 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer, Springer International Publishing, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: AHA-BUCH GmbH, Einbeck, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 64,19

    Spedizione EUR 64,98
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer Nature Switzerland AG, Cham, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: AussieBookSeller, Truganina, VIC, Australia

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 109,55

    Spedizione EUR 31,22
    Spedito da Australia a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Paperback. Condizione: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer, Springer International Publishing Jan 2026, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 64,19

    Spedizione EUR 23,00
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills. 668 pp. Englisch.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer, Springer International Publishing Jan 2026, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 64,19

    Spedizione EUR 23,00
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well asCyber Security operations and Cyber Physical System domain will want to purchase this book. It s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills. 668 pp. Englisch.

  • Rajkumar Banoth

    Lingua: Inglese

    Editore: Springer, Springer International Publishing Jan 2026, 2026

    ISBN 10: 3032064384 ISBN 13: 9783032064387

    Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    Print on Demand

    EUR 64,19

    Spedizione EUR 60,00
    Spedito da Germania a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 668 pp. Englisch.