[go: up one dir, main page]

Ouaissa et al., 2024 - Google Patents

Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices

Ouaissa et al., 2024

Document ID
4477055824622673006
Author
Ouaissa M
Ouaissa M
Publication year

External Links

Snippet

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers …
Continue reading at www.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
Perwej et al. A systematic literature review on the cyber security
Vacca Network and system security
Friedman et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses
Chivukula et al. A study of cyber security issues and challenges
Chapagain et al. SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures
Kaushik et al. A novel approach for an automated advanced MITM attack on IoT networks
Tabassum et al. Ethical hacking and penetrate testing using Kali and metasploit framework
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Aijaz et al. Security operations center—A need for an academic environment
Shieh et al. Strategy and tactics against ransomware
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Sharma et al. Implementation analysis of ransomware and unmanned aerial vehicle attacks: Mitigation methods and uav security recommendations
Sarowa et al. Analysis of cyber attacks and cyber incident patterns over APCERT member countries
Särökaari Phishing attacks and mitigation tactics
Ouaissa et al. Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Tomar et al. Cyber Security Methodologies and Attack Management
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Anchugam Essential security elements and phases of hacking attacks
Narain Ransomware-rising menace to an unsuspecting cyber audience
Lingamgunta Cyber Security For Beginners
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems
Badrulddin A study and analysis of attacks by exploiting the source code against computer systems
Viegas et al. The cybersecurity challenge
Robles et al. Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits