+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions

  • ID: 2616829
  • Book
  • December 2013
  • 360 Pages
  • John Wiley and Sons Ltd
1 of 3

Your organization is probably under attack right now.

What are you doing about it?

Cyber crime is perhaps the fastest–growing crime category, increasing by as much as 300 percent each year. Your organization is undoubtedly under attack at this very moment.

This book looks at security systemically. Beginning with the use of antipatterns and moving through improvements in security architecture, customizing tools, effective pen testing, and network monitoring, it demonstrates how to build security into your systems. Whether you′re dealing with a small business or a major enterprise, you′ll learn how to create and maintain cybersecurity that works.

  • Examine a range of common antipatterns and their refactored solutions
  • Ensure protection of Linux as well as Windows environments
  • Learn specific tools and protocols for securing healthcare IT
  • Use the exercises at the end of each chapter to improve your understanding
  • Educate your staff with a cybersecurity course built on this guide
  • Learn how to create, use, and migrate virtual machines for testing
  • Understand how cloud computing affects enterprise security
  • Customize BackTrack Linux test discs with advanced tools
  • Dive deeper into intense topics such as advanced Wireshark/tcpdump filtering, Windows/Linux/Python network programming, and invoking automated Metasploit attacks from operating system command lines and scripts

Visit [external URL] for a custom course syllabus, PowerPoint slides, and test bank, as well as downloadable custom scripts for Advanced Log Analysis

Note: Product cover images may vary from those shown
2 of 3

Introduction xix

Part I Cyber Network Security Concepts 1

Chapter 1 Executive Summary 3

Chapter 2 The Problems: Cyber Antipatterns 15

Chapter 3 Enterprise Security Using the Zachman Framework 37

Part II Cyber Network Security Hands–On 59

Chapter 4 Network Administration for Security Professionals 61

Chapter 5 Customizing BackTrack and Security Tools 103

Chapter 6 Protocol Analysis and Network Programming 115

Chapter 7 Reconnaissance, Vulnerability Assessment, and Cyber Testing 139

Chapter 8 Penetration Testing 165

Chapter 9 Cyber Network Defense Using Advanced Log Analysis 189

Part III Cyber Network Application Domains 217

Chapter 10 Cybersecurity for End Users, Social Media, and Virtual Worlds 219

Chapter 11 Cybersecurity Essentials for Small Business 233

Chapter 12 Large Enterprise Cybersecurity: Data Centers and Clouds 241

Chapter 13 Healthcare Information Technology Security 269

Chapter 14 Cyber Warfare: An Architecture for Deterrence 277

Glossary 307

Bibliography 317

Index 323

Note: Product cover images may vary from those shown
3 of 3
Thomas J. Mowbray
Note: Product cover images may vary from those shown