Skip to content
  • Podcast
  • Microcast
  • Books
  • Context
  • Search
    • Podcast Programs
      • Chapters
      • Engaging the World
      • How + Why
      • Medium History
      • The Fire Problem
      • Without...
    • Podcast Series
      • Adjust Accordingly
      • Eichler Sessions
      • Environmental Justice
      • Ethnic Studies
      • Gender and Sexuality
      • Love of Food
      • Placing Equity into Practice
      • Science + Technology
      • Significance of Race
      • Sounds + Stories
      • The Grammar
    • Book Collections
      • Arts
      • Biography + Memoir
      • Business + Education
      • Children
      • Comics + Graphic Novels
      • Cooking
      • History
      • Poetry
      • Science + Technology
      • Young Adult
    • Book Lists
      • Children Bestsellers
      • Fiction Bestsellers
      • Nonfiction Bestsellers
      • Book Awards
      • Indie Next List
      • Indie Next List for Kids
  • Sign in
0

Past ForwardPast Forward

  • Podcast
  • Microcast
  • Books
  • Context
  • Search
    • Podcast Programs
      • Chapters
      • Engaging the World
      • How + Why
      • Medium History
      • The Fire Problem
      • Without...
    • Podcast Series
      • Adjust Accordingly
      • Eichler Sessions
      • Environmental Justice
      • Ethnic Studies
      • Gender and Sexuality
      • Love of Food
      • Placing Equity into Practice
      • Science + Technology
      • Significance of Race
      • Sounds + Stories
      • The Grammar
    • Book Collections
      • Arts
      • Biography + Memoir
      • Business + Education
      • Children
      • Comics + Graphic Novels
      • Cooking
      • History
      • Poetry
      • Science + Technology
      • Young Adult
    • Book Lists
      • Children Bestsellers
      • Fiction Bestsellers
      • Nonfiction Bestsellers
      • Book Awards
      • Indie Next List
      • Indie Next List for Kids

Your cart

Cybersecurity for Beginners: How to Defend Against Hackers & Malware by Kovacs, Attila

Cybersecurity for Beginners: How to Defend Against Hackers & Malware

Cybersecurity for Beginners: How to Defend Against Hackers & Malware

Attila Kovacs

$34.95

$29.71

 
 
This item is a recurring or deferred purchase. By continuing, I agree to the cancellation policy and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted.

Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?
Do you want to know what tools and techniques are used in Cybersecurity?
Do you want to know what daily tasks you must do to protect your Infrastructure?


If the answer is yes to the above questions, this book is for you!

Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY!

IN THIS BOOK YOU WILL LEARN:

  • What is Data Analytics in a Nutshell
  • How to Measure Cybersecurityin today's Tech Industry
  • How to use Trend Analysis to Prevent Intrusion
  • What is Data Aggregation and Correlation
  • What is Defense in Depth
  • What Breach Detection Tools you can Deploy
  • What is IPS aka Intrusion Prevention System
  • What are Software & Hardware Based Firewalls
  • What is and How to Deploy EMET aka Enhanced Mitigation Experience Toolkit
  • Why you must use Web Application Firewalls VS Proxys
  • What is Pen Testing and how to Identify Security Flows
  • What Pen Test Procedures you must follow
  • How Reverse Engineering Works
  • What Risk Evaluation Steps you must Follow
  • What are the Essentials of Security Frameworks
  • What are the Policy Framework Procedures
  • What are the Control Framework Procedures
  • What is and how to Deploy Quality Controls & Verification Processes, and much more...


BUY THIS BOOK NOW, AND GET STARTED TODAY!



Binding Type: Hardcover
Publisher: Sabi Shepherd Ltd
Published: 08/09/2019
ISBN: 9781839380051
Pages: 122
Weight: 0.74lbs
Size: 9.00h x 6.00w x 0.31d

Mission

Past Forward is a public service dedicated to educational accessibility.

Podcast

Listen to episodes on our website, Apple, Spotify, or wherever you podcast.

Books

Search millions of discounted books with next business day shipping in the US.

Information

To learn more, please visit Context, Disclaimers, Policies, Terms, and Privacy Choices.

© 2014-2025 Past Forward