Ouaissa et al., 2024 - Google Patents
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and PracticesOuaissa et al., 2024
- Document ID
- 4477055824622673006
- Author
- Ouaissa M
- Ouaissa M
- Publication year
External Links
Snippet
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers …
- 238000005516 engineering process 0 abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Perwej et al. | A systematic literature review on the cyber security | |
| Vacca | Network and system security | |
| Friedman et al. | Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses | |
| Chivukula et al. | A study of cyber security issues and challenges | |
| Chapagain et al. | SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures | |
| Kaushik et al. | A novel approach for an automated advanced MITM attack on IoT networks | |
| Tabassum et al. | Ethical hacking and penetrate testing using Kali and metasploit framework | |
| Diwan | An investigation and analysis of cyber security information systems: latest trends and future suggestion | |
| Aijaz et al. | Security operations center—A need for an academic environment | |
| Shieh et al. | Strategy and tactics against ransomware | |
| Gür et al. | Security analysis of computer networks: Key concepts and methodologies | |
| Sharma et al. | Implementation analysis of ransomware and unmanned aerial vehicle attacks: Mitigation methods and uav security recommendations | |
| Sarowa et al. | Analysis of cyber attacks and cyber incident patterns over APCERT member countries | |
| Särökaari | Phishing attacks and mitigation tactics | |
| Ouaissa et al. | Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices | |
| Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
| Tomar et al. | Cyber Security Methodologies and Attack Management | |
| Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
| Anchugam | Essential security elements and phases of hacking attacks | |
| Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
| Lingamgunta | Cyber Security For Beginners | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems | |
| Badrulddin | A study and analysis of attacks by exploiting the source code against computer systems | |
| Viegas et al. | The cybersecurity challenge | |
| Robles et al. | Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits |