img Leseprobe Leseprobe

Cybersecurity Design Principles

Building Secure Resilient Architecture

Richie Miller

EPUB
ca. 6,49
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Pastor Publishing Ltd img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Informatik, EDV

Beschreibung

If you want to become a Cybersecurity Professional, this book is for you!


If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam.

 

BUY THIS BOOK NOW AND GET STARTED TODAY!

 

In this book you will discover:

Baseline Configuration, Diagrams & IP Management  

Data Sovereignty & Data Loss Prevention    

Data Masking, Tokenization & Digital Rights Management        

Geographical Considerations & Cloud Access Security Broker     

Secure Protocols, SSL Inspection & Hashing 

API Gateways & Recovery Sites     

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing            

IaaS, PaaS & SaaS          

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers   

Microservices and APIs  

Infrastructure as Code (IAC) & Software Defined Networking (SDN)            

Service Integrations and Resource Policies   

Environments, Provisioning & Deprovisioning               

Integrity Measurement & Code Analysis       

Security Automation, Monitoring & Validation            

Software Diversity, Elasticity & Scalability    

Directory Services, Federation & Attestation

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing  

Deguassing, Purging & Wiping     

Cryptographic Terminology and History       

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators


 

BUY THIS BOOK NOW AND GET STARTED TODAY!

Kundenbewertungen

Schlagwörter

NETWORK SECURITY, CISSP STUDY GUIDE, CISSP, ethical hacking FOR BEGINNERS, ethical hacking FOR DUMMIES, hacking FOR BEGINNERS, Cyber security, Cybersecurity for beginners, comptia security, Cybersecurity, hacking FOR DUMMIES, ethical hacking, Cybersecurity for dummies, hacking for beginners, CISSP EXAM, comptia, CISSP EXAM STUDY GUIDE, comptia security+, hacking