Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization, 2/e (Paperback)
暫譯: 網路安全威脅、惡意軟體趨勢與策略:探索現代威脅的風險緩解策略,第二版 (平裝本)
Tim Rains
- 出版商: Packt Publishing
- 出版日期: 2023-01-25
- 售價: $1,710
- 貴賓價: 9.5 折 $1,625
- 語言: 英文
- 頁數: 584
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1804613673
- ISBN-13: 9781804613672
-
相關分類:
Penetration-test
立即出貨 (庫存=1)
買這商品的人也買了...
-
大話設計模式$620$490 -
Identity and Data Security for Web Development: Best Practices$1,292$1,224 -
Attacking Network Protocols|王牌駭客的網路攻防手法大公開 (Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation)$480$408 -
領域驅動設計:軟體核心複雜度的解決方法 (Domain-Driven Design: Tackling Complexity in the Heart of Software)$680$530 -
重構|改善既有程式的設計, 2/e (繁中平裝版)(Refactoring: Improving The Design of Existing Code, 2/e)$800$632 -
Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748 -
$301Web 安全漏洞原理及實戰 -
神之手:動畫大神 加加美高浩的繪手神技$550$495 -
零信任網路|在不受信任的網路中建構安全系統 (Zero Trust Networks)$480$379 -
重新認識 Vue.js:008天絕對看不完的 Vue.js 3 指南$600$468 -
生活資安五四三!:從生活周遭看風險與資訊安全(iT邦幫忙鐵人賽系列書)$500$390 -
Windows APT Warfare:惡意程式前線戰術指南$600$468 -
不只是工程師才要懂的 App 資訊安全:取得資安檢測合格證書血淚史(iT邦幫忙鐵人賽系列書)$600$468 -
網路時代人人要學的資安基礎必修課 (How Cybersecurity Really Works)$480$379 -
Metasploit Web 滲透測試實戰$419$398 -
Web API 設計原則|API 與微服務傳遞價值之道 (Principles of Web API Design: Delivering Value with APIs and Microservices)$520$411 -
PCI Compliance, 5/e (Paperback)$2,100$1,995 -
OAuth 2.0 從入門到實戰:利用驗證和授權守護 API 的安全$600$468 -
駭客就在你旁邊:內網安全攻防滲透你死我活, 2/e$880$695 -
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs (Paperback)$1,640$1,558 -
快速學會 Python 架站技術:活用 Django 4 建構動態網站的 16堂課$780$608 -
CISA – Certified Information Systems Auditor Study Guide: Achieve CISA certification with practical examples and over 850 exam-oriented practice questions, 2/e (Paperback)$2,980$2,831 -
你的網站非常危險 - Web安全攻防滲透駭客現場直播$880$748 -
26大企業紅藍隊攻防演練:從企業永續報告書精進資安網路攻防框架(iThome鐵人賽系列書)$650$507 -
$764隱私保護計算實戰
相關主題
商品描述
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats
Key Features
- Protect your organization from cybersecurity threats with field-tested strategies
- Understand threats such as exploits, malware, internet-based threats, and governments
- Measure the effectiveness of your organization's current cybersecurity program against modern attackers' tactics
Book Description
Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.
Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.
By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.
What you will learn
- Discover enterprise cybersecurity strategies and the ingredients critical to their success
- Improve vulnerability management by reducing risks and costs for your organization
- Mitigate internet-based threats such as drive-by download attacks and malware distribution sites
- Learn the roles that governments play in cybersecurity and how to mitigate government access to data
- Weigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and others
- Implement and then measure the outcome of a cybersecurity strategy
- Discover how the cloud can provide better security and compliance capabilities than on-premises IT environments
Who this book is for
This book is for anyone who is looking to implement or improve their organization's cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.
商品描述(中文翻譯)
實施有效的網路安全策略,幫助您和您的安全團隊保護、檢測和應對現代威脅
主要特點
- 使用經過實地測試的策略來保護您的組織免受網路安全威脅
- 了解如漏洞利用、惡意軟體、基於網路的威脅和政府等威脅
- 衡量您組織目前的網路安全計畫對現代攻擊者戰術的有效性
書籍描述
Tim Rains 是微軟前全球首席安全顧問及亞馬遜網路服務(AWS)前全球公共部門安全領導者。他在過去二十年中,為全球的私營和公共部門組織提供網路安全策略的建議。
《網路安全威脅、惡意軟體趨勢與策略(第二版)》建立在第一版的成功之上,幫助了許多有志於成為首席資訊安全官(CISO)和網路安全專業人士理解並發展有效的數據驅動網路安全策略。在本版中,您將檢視漏洞披露和利用的長期趨勢、惡意軟體感染的區域差異及其背後的社會經濟因素,以及勒索軟體如何從一種不明威脅演變為網路安全中最令人畏懼的威脅。您還將獲得有關政府在網路安全中所扮演角色的寶貴見解,包括他們作為威脅行為者的角色,以及如何減少政府對數據的訪問。書籍最後深入探討了使用雲端的現代網路安全方法。
在本書結束時,您將對威脅環境有更深入的理解,學會如何識別良好的網路威脅情報,以及如何衡量您組織的網路安全策略的有效性。
您將學到的內容
- 發現企業網路安全策略及其成功的關鍵要素
- 通過降低風險和成本來改善漏洞管理
- 減輕基於網路的威脅,如隨機下載攻擊和惡意軟體分發網站
- 了解政府在網路安全中所扮演的角色,以及如何減少政府對數據的訪問
- 權衡流行網路安全策略的利弊,如零信任(Zero Trust)、入侵殺鏈(Intrusion Kill Chain)等
- 實施並衡量網路安全策略的結果
- 發現雲端如何提供比本地 IT 環境更好的安全性和合規能力
本書適合誰
本書適合任何希望實施或改善其組織網路安全策略的人士。這包括首席資訊安全官(CISO)、首席安全官(CSO)、合規和審計專業人士、安全架構師和網路安全專業人士。假設讀者具備基本的資訊科技(IT)、軟體開發原則和網路安全概念知識。
目錄大綱
1. Introduction
2. What to Know About Threat Intelligence
3. Using Vulnerability Trends to Reduce Risk and Costs
4. The Evolution of Malware
5. Internet-Based Threats
6. The Roles Governments Play in Cybersecurity
7. Government access to data
8. Ingredients for a Successful Cybersecurity Strategy
9. Cybersecurity Strategies
10. Strategy Implementation
11. Measuring Performance and Effectiveness
12. Modern Approaches to Security and Compliance
目錄大綱(中文翻譯)
1. Introduction
2. What to Know About Threat Intelligence
3. Using Vulnerability Trends to Reduce Risk and Costs
4. The Evolution of Malware
5. Internet-Based Threats
6. The Roles Governments Play in Cybersecurity
7. Government access to data
8. Ingredients for a Successful Cybersecurity Strategy
9. Cybersecurity Strategies
10. Strategy Implementation
11. Measuring Performance and Effectiveness
12. Modern Approaches to Security and Compliance