Bücher Wenner
Olga Grjasnowa liest aus "JULI, AUGUST, SEPTEMBER
04.02.2025 um 19:30 Uhr
Offensive and Defensive Cyber Security Strategies
Fundamentals, Theory and Practices
von Mariya Ouaissa, Mariyam Ouaissa
Verlag: Taylor & Francis
E-Book / PDF
Kopierschutz: kein Kopierschutz


Speicherplatz: 4 MB
Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-1-04-021504-3
Auflage: 1. Auflage
Erscheint am 22.11.2024
Sprache: Englisch
Umfang: 116 Seiten

Preis: 40,99 €

Klappentext
Biografische Anmerkung
Inhaltsverzeichnis

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.



Mariya Ouaissa is currently an Assistant Professor in Cybersecurity and Networks at Faculty of Sciences Semlalia, Cadi Ayyad University, Marrakech, Morocco. She is a Ph.D. graduated in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, graduated in 2013 from National School of Applied Sciences Khouribga, Morocco. She is a Co-Founder and IT Consultant at IT Support and Consulting Center.

Mariyam Ouaissa is currently an Assistant Professor in Networks and Systems at ENSA, Chouaib Doukkali University, El Jadida, Morocco. She received her Ph.D. degree in 2019 from National Graduate School of Arts and Crafts, Meknes, Morocco and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr Ouaissa's research is multidisciplinary that focuses on Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problem and the resource allocation management and access control.



1. Fundamentals of cybersecurity strategies 2. Offensive cybersecurity tools and technologies 3. Defensive cybersecurity tools and technologies 4. Threat modeling and risk management 5. Cybersecurity incident response and digital forensics 6. Use of AI and blockchain in cybersecurity


andere Formate