دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Alexander J. Roxon
سری:
ISBN (شابک) : 1484270355, 9781484270356
ناشر: Apress
سال نشر: 2021
تعداد صفحات: 327
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 3 مگابایت
در صورت تبدیل فایل کتاب Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مسیر InfoSec خود را انتخاب کنید: یک ماجراجویی امنیت سایبری تعاملی برای مبتدیان نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
شروع
Beginning
Contents About the Author About the Technical Reviewer Acknowledgments Preface Chapter 1: Life’s a Breach 1 Phase One—Prologue 2 Phase One—Prologue 3 Phase Two—Preparation 4 Phase Two—Preparation 5 Phase Four—Aftermath 6 Phase Three—Attack 7 Phase Four—Aftermath 8 Phase Two—Preparation 9 Phase Four—Aftermath 10 Phase Four—Aftermath 11 Phase Four—Aftermath 12 Phase Three—Attack 13 Phase Three—Attack 14 Phase Four—Aftermath 15 Phase Four—Aftermath 16 Phase Two—Preparation 17 Phase Three—Attack 18 Phase Three—Attack 19 Phase Three—Attack 20 Phase Three—Attack 21 Phase Four—Aftermath 22 Phase Two—Preparation 23 Phase Three—Attack 24 Phase Four—Aftermath 25 Phase Three—Attack 26 Phase Three—Attack 27 Phase Two—Preparation 28 Phase Two—Preparation 29 Phase Two—Preparation 30 Phase Three—Attack 31 Phase Three—Attack 32 Phase Two—Preparation 33 Phase Three—Attack 34 Phase Two—Preparation 35 Phase Three—Attack 36 Phase Three—Attack 37 Phase Three—Attack 38 Phase Four—Aftermath 39 Phase Two—Preparation 40 Phase Two—Preparation 41 Phase Four—Aftermath 42 Phase Four—Aftermath 43 Phase Two—Preparation 44 Phase Three—Attack 45 Phase Three—Attack 46 Phase Three—Attack 47 Phase Three—Attack 48 Phase Three—Attack 49 Phase Three—Attack 50 Phase Four—Aftermath 51 Phase Three—Attack 52 Phase Three—Attack 53 Phase Three—Attack 54 Phase Three—Attack 55 Phase Three—Attack 56 Phase Two—Preparation 57 Phase Three—Attack 58 Phase Three—Attack 59 Phase Three—Attack 60 Phase Four—Aftermath 61 Phase Four—Aftermath 62 Phase Four—Aftermath 63 Phase Two—Preparation 64 Phase Two—Preparation 65 Phase Four—Aftermath 66 Phase Two—Preparation 67 Phase Three—Attack 68 Phase Four—Aftermath 69 Phase Three—Attack 70 Phase Two—Preparation 71 Phase Three—Attack 72 Phase Three—Attack 73 Phase Three—Attack 74 Phase Two—Preparation 75 Phase Four—Aftermath 76 Phase Two—Preparation 77 Phase Three—Attack 78 Phase Three—Attack 79 Phase Two—Preparation 80 Phase Two—Preparation 81 Phase Two—Preparation 82 Phase Four—Aftermath 83 Phase Three—Attack 84 Phase Two—Preparation 85 Phase Three—Attack 86 Phase Four—Aftermath 87 Phase Two—Preparation 88 Phase Three—Attack 89 Phase Four—Aftermath 90 Phase Two—Preparation 91 Phase Four—Aftermath 92 Phase Two—Preparation 93 Phase Two—Preparation 94 Phase Two—Preparation 95 Phase Two—Preparation 96 Phase Four—Aftermath 97 Phase Two—Preparation 98 Phase Two—Preparation 99 Phase Four—Aftermath 100 Phase Two—Preparation 101 Phase Four—Aftermath 102 Phase Three—Attack 103 Phase Three—Attack 104 Phase Four—Aftermath 105 Phase Two—Preparation 106 Phase Four—Aftermath 107 Phase Four—Aftermath 108 Phase Three—Attack 109 Phase Three—Attack 110 Phase Four—Aftermath 111 Phase Three—Attack 112 Phase Four—Aftermath 113 Phase Four—Aftermath 114 Phase Three—Attack 115 Phase Three—Attack 116 Phase Two—Preparation 117 Phase Two—Preparation 118 Phase Four—Aftermath 119 Phase Three—Attack 120 Phase Three—Attack 121 Phase Two—Preparation 122 Phase Two—Preparation 123 Phase Three—Attack 124 Phase Two—Preparation 125 Phase Two—Preparation 126 Phase Three—Attack 127 Phase Four—Aftermath 128 Phase Two—Preparation 129 Phase Four—Aftermath 130 Phase Three—Attack 131 Phase Three—Attack 132 Phase Two—Preparation 133 Phase Three—Attack 134 Phase Three—Attack 135 Phase Three—Attack 136 Phase Four—Aftermath 137 Phase Two—Preparation 138 Phase Four—Aftermath 139 Phase Two—Preparation 140 Phase Three—Attack 141 Phase One—Prologue 142 Phase Three—Attack 143 Phase Three—Attack 144 Phase Two—Preparation 145 Phase Three—Attack 146 Phase Three—Attack 147 Phase Three—Attack 148 Phase Three—Attack 149 Phase Three—Attack 150 Phase Three—Attack 151 Phase Two—Preparation 152 Phase Three—Attack 153 Phase One—Prologue 154 Phase Four—Aftermath 155 Phase Two—Preparation 156 Phase Three—Attack 157 Phase Two—Preparation 158 Phase Three—Attack 159 Phase Two—Preparation 160 Phase Three—Attack 161 Phase One—Prologue 162 Phase Three—Attack 163 Phase Two—Preparation 164 Phase Four—Aftermath 165 Phase Two—Preparation 166 Phase Three—Attack 167 Phase Three—Attack 168 Phase Three—Attack 169 Phase Three—Attack 170 Phase Three—Attack 171 Phase Three—Attack 172 Phase Three—Attack 173 Phase Two—Preparation 174 Phase Three—Attack 175 Phase Three—Attack 176 Phase Three—Attack 177 Phase Three—Attack 178 Phase Four—Aftermath 179 Phase Three—Attack 180 Phase Three—Attack 181 Phase Four—Aftermath 182 Phase Three—Attack 183 Phase Three—Attack 184 Phase Three—Attack 185 Phase Three—Attack 186 Phase Three—Attack 187 Phase Two—Preparation 188 Phase Three—Attack 189 Phase Two—Preparation 190 Phase Three—Attack 191 Phase Three—Attack 192 Phase Four—Aftermath 193 Phase Four—Aftermath 194 Phase Three—Attack 195 Phase Four—Aftermath 196 Phase Two—Preparation 197 Phase Three—Attack 198 Phase Two—Preparation 199 Phase Two—Preparation 200 Phase Three—Attack 201 Phase Four—Aftermath 202 Phase Three—Attack 203 Phase Two—Preparation 204 Phase Four—Aftermath 205 Phase Three—Attack 206 Phase Three—Attack 207 Phase Two—Preparation 208 Phase Two—Preparation 209 Phase Three—Attack 210 Phase Three—Attack 211 Phase Three—Attack 212 Phase Three—Attack 213 Phase Two—Preparation 214 Phase Three—Attack 215 Phase Two—Preparation 216 Phase Four—Aftermath 217 Phase Two—Preparation 218 Phase Four—Aftermath 219 Phase Two—Preparation 220 Phase Three—Attack 221 Phase Three—Attack 222 Phase Four—Aftermath 223 Phase Two—Preparation 224 Phase Two—Preparation 225 Phase Three—Attack 226 Phase Three—Attack 227 Phase Four—Aftermath 228 Phase Three—Attack 229 Phase Two—Preparation 230 Phase Three—Attack 231 Phase Four—Aftermath 232 Phase Three—Attack 233 Phase Three—Attack 234 Phase Four—Aftermath 235 Phase Three—Attack 236 Phase Three—Attack 237 Phase Two—Preparation 238 Phase Four—Aftermath 239 Phase One—Prologue 240 Phase Three—Attack 241 Phase Three—Attack 242 Phase Two—Preparation 243 Phase Two—Preparation 244 Phase Three—Attack 245 Phase One—Prologue 246 Phase Two—Preparation 247 Phase Two—Preparation 248 Phase Four—Aftermath 249 Phase Four—Aftermath 250 Phase One—Prologue 251 Phase Two—Preparation 252 Phase Three—Attack 253 Phase Three—Attack 254 Phase Three—Attack 255 Phase Four—Aftermath 256 Phase Three—Attack 257 Phase Two—Preparation 258 Phase Three—Attack 259 Phase Four—Aftermath 260 Phase Four—Aftermath 261 Phase Two—Preparation 262 Phase Four—Aftermath 263 Phase Four—Aftermath? 264 Phase Two—Preparation 265 Phase Three—Attack 266 Phase Three—Attack 267 Phase Three—Attack 268 Phase Four—Aftermath 269 Phase Two—Preparation 270 Phase Three—Attack 271 Phase Three—Attack 272 Phase Three—Attack 273 Phase Three—Attack 274 Phase Two—Preparation 275 Phase Two—Preparation 276 Phase Three—Attack 277 Phase Three—Attack 278 Phase Two—Preparation 279 Phase Three—Attack 280 Phase Three—Attack 281 Phase Three—Attack 282 Phase Two—Preparation 283 Phase Three—Attack 284 Phase Three—Attack 285 Phase Two—Preparation 286 Phase Three—Attack 287 Phase Two—Preparation 288 Phase Three—Attack 289 Phase Two—Preparation 290 Phase Three—Attack 291 Phase Three—Attack 292 Phase Three—Attack 293 Phase Two—Preparation 294 Phase Three—Attack 295 Phase Four—Aftermath 296 Phase Three—Attack 297 Phase Three—Attack 298 Phase Three—Attack 299 Phase Three—Attack 300 Phase Two—Preparation 301 Phase Four—Aftermath 302 Phase Two—Preparation 303 Phase Two—Preparation 304 Phase Two—Preparation 305 Phase Three—Attack 306 Phase Three—Attack 307 Phase Three—Attack 308 Phase Two—Preparation 309 Phase Three—Attack 310 Phase Two—Preparation 311 Phase Three—Attack 312 Phase Two—Preparation 313 Phase Three—Attack 314 Phase One—Prologue 315 Phase Three—Attack 316 Phase Three—Attack 317 Phase Two—Preparation 318 Phase Three—Attack 319 Phase Two—Preparation 320 Phase Two—Preparation 321 Phase Three—Attack 322 Phase Four—Aftermath 323 Phase Two—Preparation 324 Phase Two—Preparation 325 Phase Three—Attack 326 Phase Two—Preparation 327 Phase Two—Preparation 328 Phase Three—Attack 329 Phase Three—Attack 330 Phase Three—Attack 331 Phase Two—Preparation 332 Phase Four—Aftermath 333 Phase Three—Attack 334 Phase Three—Attack 335 Phase Three—Attack 336 Phase Two—Preparation 337 Phase Three—Attack 338 Phase Three—Attack 339 Phase Three—Attack 340 Phase Three—Attack 341 Phase Three—Attack 342 Phase Four—Aftermath 343 Phase Three—Attack 344 Phase Two—Preparation 345 Phase Four—Aftermath 346 Phase Two—Preparation 347 Phase Two—Preparation 348 Phase Three—Attack 349 Phase Two—Preparation 350 Phase Four—Aftermath 351 Phase Two—Preparation 352 Phase Two—Preparation 353 Phase Two—Preparation 354 Phase Two—Preparation 355 Phase Three—Attack 356 Phase Two—Preparation 357 Phase Three—Attack 358 Phase Four—Aftermath 359 Phase Three—Attack 360 Phase Two—Preparation 361 Phase Four—Aftermath 362 Phase Three—Attack 363 Phase Four—Aftermath 364 Phase Four—Aftermath 365 Phase Three—Attack 366 Phase Three—Attack 367 Phase Two—Preparation 368 Phase Four—Aftermath Glossary Active Directory Air Gap Allow list Authentication/Authenticate Backdoor Block list Brute Forcing/Brute Force Attack Botnet Bug Bounty Business Email Compromise Chief Information Security Officer (CISO) CIA Triad Code Controls Credential Stuffing Crime as a Service Cryptomining Cyberinsurance Dark Web Data Breach Data Loss Prevention Data Packet DDoS Drive-By Compromise e-Commerce Encryption Event Firewall GDPR Hacktivist Honeypot Incident Response Plan Incident Response Retainer Information Security Policy Internal Audit Internet Protocol (IP) Address Intruder Detection System Keylogger Kill Switch Lanyard Logic Bomb Log Macro Mail Order Telephone Order Malicious Insider Malware Mitigation Multi-factor Authentication OSINT Packet Packet Filtering Patching Payload PCI DSS Penetration Testing Phishing Plain Text Port Privilege Escalation Ransomware Risk Risk Register Root Kit Script Kiddie Security Operations Centre (SOC) Server Shoulder Surfing Social Engineering Sophisticated Actor Stresser Supply Chain Attack Third Party Threat Actor Ticket Trojan Virus Vulnerability Vulnerability Scan Zero Day Index