The Cybersecurity Trinity - Donnie Wendt
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre54,52 €
Produit Neuf
Ou 13,63 € /mois
- Livraison à 0,01 €
- Livré entre le 11 et le 23 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
Nos autres offres
-
50,32 €
Produit Neuf
Ou 12,58 € /mois
- Livraison à 0,01 €
Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 20 à 30 jours ouvrables.
-
54,52 €
Produit Neuf
Ou 13,63 € /mois
- Livraison à 0,01 €
- Livré entre le 11 et le 23 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur The Cybersecurity Trinity de Donnie Wendt Format Broché - Livre Informatique
0 avis sur The Cybersecurity Trinity de Donnie Wendt Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Yoshitomo Nara: Pinacoteca
Occasion dès 62,33 €
-
Complete Ielts Bands 6.5-7.5 Workbook Without Answers With Audio Cd
Neuf dès 38,71 €
-
Tour Auto - 25e Édition
1 avis
Neuf dès 59,00 €
Occasion dès 35,40 €
-
Storm Chasing Handbook, 2nd. Ed.
Neuf dès 64,46 €
-
Horror Films - Cinéma Fantastique -
Occasion dès 29,80 €
-
Pucci De Rossi: '71-'96
Occasion dès 49,70 €
-
Finance For Executives
Occasion dès 50,00 €
-
David Busch's Canon Eos R6 Ii Guide To Digital Photography
Neuf dès 46,39 €
Occasion dès 82,99 €
-
Medicine 1 - Student's Book
Occasion dès 47,99 €
-
Encyclopedia Of Hydrangeas
Occasion dès 51,25 €
-
Dc Finest: Justice Society Of America: The Plunder Of The Psycho-Pirate
Neuf dès 39,20 €
-
L'allemand B2 Pack Téléchargement - Avec 1 Livre, 1 Livret Et 1 Téléchargement Audio
Neuf dès 49,90 €
Occasion dès 45,40 €
-
Dc Finest: The Flash: The Fastest Man Dead
Neuf dès 39,88 €
-
World Radio Tv Handbook 2024: The Directory Of Global Broadcasting
Neuf dès 53,48 €
Occasion dès 39,54 €
-
Evading Edr
Neuf dès 48,24 €
-
The Climbing Bible: Practical Exercises
Neuf dès 29,63 €
-
Wild Skin
Occasion dès 33,02 €
-
Staying With The Trouble
Neuf dès 36,04 €
-
Brian Blomerth's Bicycle Day
Neuf dès 31,29 €
-
Philip Glass: The Complete Piano Etudes - Piano Classics Sheet Music - Piano Chord Book - Philip Glass Piano Works
1 avis
Neuf dès 26,48 €
Occasion dès 56,99 €
Produits similaires
Présentation The Cybersecurity Trinity de Donnie Wendt Format Broché
- Livre Informatique
Résumé :
This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential. With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them. Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure. Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. Who This Book is for: The primary audience is cybersecurity professionals looking to improve their organization's security posture by leveraging AI and ML-based security tools and combining them into a comprehensive strategy incorporating automation and ACD. This target audience will have a cybersecurity background and an interest in AI and ML. Higher education would be a secondary audience....
Biographie:
Donnie Wendt is a distinguished cybersecurity professional with extensive expertise in researching security threats and pioneering innovative solutions. He has broad practical experience implementing numerous cybersecurity solutions and is an accomplished presenter on securing machine learning, generative AI, security automation, and deception. In addition to his professional experience, Donnie is an adjunct professor of cybersecurity at Utica University. He earned a Doctorate in Computer Science from Colorado Technical University and a Master's in Cybersecurity from Utica University. After over 30 years in information technology, Donnie wants to share his knowledge with others. The initial concept for the book arose from Donnie's doctoral dissertation, where he researched using security automation and deception to address both sides of the cyber defense equation. Over the past several years, AI has come to the forefront and is now used in many products, including cybersecurity solutions. Donnie realized that AI-powered solutions could provide the foundation to enhance his prior research. However, despite the prevalence of AI, many cybersecurity professionals do not understand its core concepts. Therefore, Donnie began his quest to educate colleagues on AI's power and associated risks....
Détails de conformité du produit
Personne responsable dans l'UE