A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture.
Your organization is probably under attack right now.
What are you doing about it?
Cyber crime is perhaps the fastest-growing crime category, increasing by as much as 300 percent each year. Your organization is undoubtedly under attack at this very moment.
This book looks at security systemically. Beginning with the use of antipatterns and moving through improvements in security architecture, customizing tools, effective pen testing, and network monitoring, it demonstrates how to build security into your systems. Whether you're dealing with a small business or a major enterprise, you'll learn how to create and maintain cybersecurity that works.
Visit for a custom course syllabus, PowerPoint slides, and test bank, as well as downloadable custom scripts for Advanced Log Analysis
A must-have, hands-on guide for working in the cybersecurity profession
Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.