책 이미지
책 정보
· 분류 : 외국도서 > 인문/사회 > 사회과학 > 범죄학
· ISBN : 9781032821092
· 쪽수 : 286쪽
· 출판일 : 2024-10-24
목차
1. Unveiling the Dark: Exploring Cyber Threats: An introductory exploration into the varied and evolving nature of cyber threats. 2. Cybercrime Unmasked: A Deep Dive into the Criminal Mind: Insight into the psychology and tactics of cybercriminals. 3. Masters of Defense: Harnessing AI and Machine Learning for Cybersecurity: Discussing the use of AI and machine learning in fortifying cyber defenses. 4. Blockchain Revolution: Fortifying the Digital Frontier: Examining the impact of blockchain technology on enhancing digital security. 5. Digital Detectives: The Art of Incident Investigation: Techniques and strategies used in cyber incident investigations. 6. Guardians of Your Data: Demystifying Antivirus Solutions: Understanding the workings and importance of antivirus software. 7. Decoding Digital Malice: The World of Malware Analysis: A detailed look at malware types, analysis, and defense strategies. 8. The Cyber Attack Odyssey: Navigating the Attack Life: An overview of the lifecycle of a cyber attack from inception to resolution. 9. Breaching the Wall: Uncovering System Compromising: Investigating methods used to compromise and breach systems. 10. Spycraft in the Digital Age: Intelligence and Info Gathering: The techniques of gathering information and intelligence in the cyber world. 11. Cyber Hunt or Be Hunted: The Art of Credential Hunting: Exploring the tactics of hunting for and protecting credentials. 12. The Climb to Control: Escalation of Privileges Unveiled: Understanding the methods of gaining elevated access in systems. 13. Eyes in the Shadows: The Power of Cyber Intelligence: The role of intelligence in understanding and combating cyber threats. 14. OSINT: Open Source Intelligence: The use and importance of publicly available information in cybersecurity. 15. Swift Response, Solid Defense: The Computer Incident Response Process: Outlining effective incident response strategies. 16. Strategies of the Cyber Knights: Crafting Countermeasures: Developing and implementing countermeasures against cyber threats. 17. Rising from the Ashes: The Cyber Recovery Process: The processes involved in recovering from a cyber incident. 18. The Guardian's Code: Crafting a Secure Security Policy: Guidelines for developing robust and effective security policies. 19. Hunting Vulnerabilities: The Art of Vulnerability Management: Techniques for identifying and managing system vulnerabilities.














