The effective and proven techniques presented in this book combine a multi-layer defense-in-depth approach to cybersecurity. It illustrates how various technologies and algorithms are applied in practice to build real-world security solutions and it explains how these solutions fit into the different bands of the security spectrum, together, form a comprehensive layered defense. This layered defense includes: Next generation endpoint techniques Virtualization and isolation Browser protection Network protection Integrating endpoint and network protection Gathering and analyzing security data in a data lake User behavior analysis Cloud security The security horizon with blockchain and quantum computing
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.