|
![]() |
|||
|
||||
OverviewThis book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream job in this dynamic field. This beginner-friendly cybersecurity guide helps you safely navigate the digital world. The reader will also learn about operating systems like Windows, Linux, and UNIX, as well as secure server management. We will also understand networking with TCP/IP and packet analysis, master SQL queries, and fortify databases against threats like SQL injection. Discover proactive security with threat modeling, penetration testing, and secure coding. Protect web apps from OWASP/SANS vulnerabilities and secure networks with pentesting and firewalls. Finally, explore cloud security best practices using AWS to identify misconfigurations and strengthen your cloud setup. Full Product DetailsAuthor: Karl Gilbert , Sayanta SenPublisher: BPB Publications Imprint: BPB Publications ISBN: 9789355518941ISBN 10: 9355518943 Pages: 550 Publication Date: 05 August 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationKarl Gilbert is a seasoned cybersecurity professional with over a decade of experience in securing systems and applications from both offensive and defensive perspectives. Currently employed by a leading technology and hardware company, he plays a vital role in safeguarding their online and physical retail space against cyber attacks. Sayanta Sen has dedicated the past seven years to working with numerous corporations, helping them fortify their networks, systems, and cloud infrastructure against malicious actors and cyber-attacks. Tab Content 6Author Website:Countries AvailableAll regions |