Mastering Cybersecurity

Late Knight Books
(158)
Gewerblich
Angemeldet als gewerblicher Verkäufer
US $59,99
Ca.CHF 48,23
Artikelzustand:
Neu
5 verfügbar
Versand:
Kostenlos USPS Media MailTM.
Standort: Lansdale, PA, USA
Lieferung:
Lieferung zwischen Mi, 17. Dez und Mi, 24. Dez nach 94104 bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
Keine Rücknahme.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:357596609355
Zuletzt aktualisiert am 10. Okt. 2025 16:41:55 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
ISBN
9781032893921
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
Taylor & Francis Group
ISBN-10
1032893923
ISBN-13
9781032893921
eBay Product ID (ePID)
24074280599

Product Key Features

Number of Pages
12 Pages
Publication Name
Mastering Cybersecurity : a Practical Guide to Cyber Tools and Techniques (Volume 2)
Language
English
Publication Year
2025
Subject
Security / Cryptography, Security / General, General, Security / Networking
Type
Textbook
Author
Akashdeep Bhardwaj
Subject Area
Mathematics, Computers
Format
Trade Paperback

Dimensions

Item Length
10 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2024-033681
Illustrated
Yes
Table Of Content
Chapter 1: Deciphering Network Packets for Cyber Professionals. Chapter 2: Network Attacks Decoded. Chapter 3: Open-Source Intelligence: Harnessing Intelligence from Digital Space. Chapter 4: Hands-On OSINT Investigations. Chapter 5: Securing Smart Interconnected Devices. Chapter 6: Ethical Hacking of Smart IoT Devices. Chapter 7: Into the Shadows of Dark Web Investigations. Chapter 8: Hands-On Dark Web Investigations. Chapter 9: Hunting the Unknown: Unveil Threats with Cyber Threat Intelligence. Chapter 10: Practical Cyber Threat Intelligence.
Synopsis
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises. This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection. The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense. Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats., Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape.
LC Classification Number
QA76.9.A25B499 2025

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

Late Knight Books

98,9% positive Bewertungen188 Artikel verkauft

Mitglied seit Jun 2018
Antwortet meist innerhalb 24 Stunden
Angemeldet als gewerblicher Verkäufer
Looking for hard to find books?Have a niche interest that no one seems to know about?Message me or visit LateKnightBooks.com Dare me to find what you need.Obscure music books: FoundOld technical ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
5.0
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (97)

Alle Bewertungenselected
Positiv
Neutral
Negativ