ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners

دانلود کتاب مسیر InfoSec خود را انتخاب کنید: یک ماجراجویی امنیت سایبری تعاملی برای مبتدیان

Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners

مشخصات کتاب

Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners

ویرایش: 1 
نویسندگان:   
سری:  
ISBN (شابک) : 1484270355, 9781484270356 
ناشر: Apress 
سال نشر: 2021 
تعداد صفحات: 327 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 3 مگابایت 

قیمت کتاب (تومان) : 54,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مسیر InfoSec خود را انتخاب کنید: یک ماجراجویی امنیت سایبری تعاملی برای مبتدیان نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مسیر InfoSec خود را انتخاب کنید: یک ماجراجویی امنیت سایبری تعاملی برای مبتدیان

شروع


توضیحاتی درمورد کتاب به خارجی

Beginning



فهرست مطالب

Contents
About the Author
About the Technical Reviewer
Acknowledgments
Preface
Chapter 1: Life’s a Breach
	1 Phase One—Prologue
	2 Phase One—Prologue
	3 Phase Two—Preparation
	4 Phase Two—Preparation
	5 Phase Four—Aftermath
	6 Phase Three—Attack
	7 Phase Four—Aftermath
	8 Phase Two—Preparation
	9 Phase Four—Aftermath
	10 Phase Four—Aftermath
	11 Phase Four—Aftermath
	12 Phase Three—Attack
	13 Phase Three—Attack
	14 Phase Four—Aftermath
	15 Phase Four—Aftermath
	16 Phase Two—Preparation
	17 Phase Three—Attack
	18 Phase Three—Attack
	19 Phase Three—Attack
	20 Phase Three—Attack
	21 Phase Four—Aftermath
	22 Phase Two—Preparation
	23 Phase Three—Attack
	24 Phase Four—Aftermath
	25 Phase Three—Attack
	26 Phase Three—Attack
	27 Phase Two—Preparation
	28 Phase Two—Preparation
	29 Phase Two—Preparation
	30 Phase Three—Attack
	31 Phase Three—Attack
	32 Phase Two—Preparation
	33 Phase Three—Attack
	34 Phase Two—Preparation
	35 Phase Three—Attack
	36 Phase Three—Attack
	37 Phase Three—Attack
	38 Phase Four—Aftermath
	39 Phase Two—Preparation
	40 Phase Two—Preparation
	41 Phase Four—Aftermath
	42 Phase Four—Aftermath
	43 Phase Two—Preparation
	44 Phase Three—Attack
	45 Phase Three—Attack
	46 Phase Three—Attack
	47 Phase Three—Attack
	48 Phase Three—Attack
	49 Phase Three—Attack
	50 Phase Four—Aftermath
	51 Phase Three—Attack
	52 Phase Three—Attack
	53 Phase Three—Attack
	54 Phase Three—Attack
	55 Phase Three—Attack
	56 Phase Two—Preparation
	57 Phase Three—Attack
	58 Phase Three—Attack
	59 Phase Three—Attack
	60 Phase Four—Aftermath
	61 Phase Four—Aftermath
	62 Phase Four—Aftermath
	63 Phase Two—Preparation
	64 Phase Two—Preparation
	65 Phase Four—Aftermath
	66 Phase Two—Preparation
	67 Phase Three—Attack
	68 Phase Four—Aftermath
	69 Phase Three—Attack
	70 Phase Two—Preparation
	71 Phase Three—Attack
	72 Phase Three—Attack
	73 Phase Three—Attack
	74 Phase Two—Preparation
	75 Phase Four—Aftermath
	76 Phase Two—Preparation
	77 Phase Three—Attack
	78 Phase Three—Attack
	79 Phase Two—Preparation
	80 Phase Two—Preparation
	81 Phase Two—Preparation
	82 Phase Four—Aftermath
	83 Phase Three—Attack
	84 Phase Two—Preparation
	85 Phase Three—Attack
	86 Phase Four—Aftermath
	87 Phase Two—Preparation
	88 Phase Three—Attack
	89 Phase Four—Aftermath
	90 Phase Two—Preparation
	91 Phase Four—Aftermath
	92 Phase Two—Preparation
	93 Phase Two—Preparation
	94 Phase Two—Preparation
	95 Phase Two—Preparation
	96 Phase Four—Aftermath
	97 Phase Two—Preparation
	98 Phase Two—Preparation
	99 Phase Four—Aftermath
	100 Phase Two—Preparation
	101 Phase Four—Aftermath
	102 Phase Three—Attack
	103 Phase Three—Attack
	104 Phase Four—Aftermath
	105 Phase Two—Preparation
	106 Phase Four—Aftermath
	107 Phase Four—Aftermath
	108 Phase Three—Attack
	109 Phase Three—Attack
	110 Phase Four—Aftermath
	111 Phase Three—Attack
	112 Phase Four—Aftermath
	113 Phase Four—Aftermath
	114 Phase Three—Attack
	115 Phase Three—Attack
	116 Phase Two—Preparation
	117 Phase Two—Preparation
	118 Phase Four—Aftermath
	119 Phase Three—Attack
	120 Phase Three—Attack
	121 Phase Two—Preparation
	122 Phase Two—Preparation
	123 Phase Three—Attack
	124 Phase Two—Preparation
	125 Phase Two—Preparation
	126 Phase Three—Attack
	127 Phase Four—Aftermath
	128 Phase Two—Preparation
	129 Phase Four—Aftermath
	130 Phase Three—Attack
	131 Phase Three—Attack
	132 Phase Two—Preparation
	133 Phase Three—Attack
	134 Phase Three—Attack
	135 Phase Three—Attack
	136 Phase Four—Aftermath
	137 Phase Two—Preparation
	138 Phase Four—Aftermath
	139 Phase Two—Preparation
	140 Phase Three—Attack
	141 Phase One—Prologue
	142 Phase Three—Attack
	143 Phase Three—Attack
	144 Phase Two—Preparation
	145 Phase Three—Attack
	146 Phase Three—Attack
	147 Phase Three—Attack
	148 Phase Three—Attack
	149 Phase Three—Attack
	150 Phase Three—Attack
	151 Phase Two—Preparation
	152 Phase Three—Attack
	153 Phase One—Prologue
	154 Phase Four—Aftermath
	155 Phase Two—Preparation
	156 Phase Three—Attack
	157 Phase Two—Preparation
	158 Phase Three—Attack
	159 Phase Two—Preparation
	160 Phase Three—Attack
	161 Phase One—Prologue
	162 Phase Three—Attack
	163 Phase Two—Preparation
	164 Phase Four—Aftermath
	165 Phase Two—Preparation
	166 Phase Three—Attack
	167 Phase Three—Attack
	168 Phase Three—Attack
	169 Phase Three—Attack
	170 Phase Three—Attack
	171 Phase Three—Attack
	172 Phase Three—Attack
	173 Phase Two—Preparation
	174 Phase Three—Attack
	175 Phase Three—Attack
	176 Phase Three—Attack
	177 Phase Three—Attack
	178 Phase Four—Aftermath
	179 Phase Three—Attack
	180 Phase Three—Attack
	181 Phase Four—Aftermath
	182 Phase Three—Attack
	183 Phase Three—Attack
	184 Phase Three—Attack
	185 Phase Three—Attack
	186 Phase Three—Attack
	187 Phase Two—Preparation
	188 Phase Three—Attack
	189 Phase Two—Preparation
	190 Phase Three—Attack
	191 Phase Three—Attack
	192 Phase Four—Aftermath
	193 Phase Four—Aftermath
	194 Phase Three—Attack
	195 Phase Four—Aftermath
	196 Phase Two—Preparation
	197 Phase Three—Attack
	198 Phase Two—Preparation
	199 Phase Two—Preparation
	200 Phase Three—Attack
	201 Phase Four—Aftermath
	202 Phase Three—Attack
	203 Phase Two—Preparation
	204 Phase Four—Aftermath
	205 Phase Three—Attack
	206 Phase Three—Attack
	207 Phase Two—Preparation
	208 Phase Two—Preparation
	209 Phase Three—Attack
	210 Phase Three—Attack
	211 Phase Three—Attack
	212 Phase Three—Attack
	213 Phase Two—Preparation
	214 Phase Three—Attack
	215 Phase Two—Preparation
	216 Phase Four—Aftermath
	217 Phase Two—Preparation
	218 Phase Four—Aftermath
	219 Phase Two—Preparation
	220 Phase Three—Attack
	221 Phase Three—Attack
	222 Phase Four—Aftermath
	223 Phase Two—Preparation
	224 Phase Two—Preparation
	225 Phase Three—Attack
	226 Phase Three—Attack
	227 Phase Four—Aftermath
	228 Phase Three—Attack
	229 Phase Two—Preparation
	230 Phase Three—Attack
	231 Phase Four—Aftermath
	232 Phase Three—Attack
	233 Phase Three—Attack
	234 Phase Four—Aftermath
	235 Phase Three—Attack
	236 Phase Three—Attack
	237 Phase Two—Preparation
	238 Phase Four—Aftermath
	239 Phase One—Prologue
	240 Phase Three—Attack
	241 Phase Three—Attack
	242 Phase Two—Preparation
	243 Phase Two—Preparation
	244 Phase Three—Attack
	245 Phase One—Prologue
	246 Phase Two—Preparation
	247 Phase Two—Preparation
	248 Phase Four—Aftermath
	249 Phase Four—Aftermath
	250 Phase One—Prologue
	251 Phase Two—Preparation
	252 Phase Three—Attack
	253 Phase Three—Attack
	254 Phase Three—Attack
	255 Phase Four—Aftermath
	256 Phase Three—Attack
	257 Phase Two—Preparation
	258 Phase Three—Attack
	259 Phase Four—Aftermath
	260 Phase Four—Aftermath
	261 Phase Two—Preparation
	262 Phase Four—Aftermath
	263 Phase Four—Aftermath?
	264 Phase Two—Preparation
	265 Phase Three—Attack
	266 Phase Three—Attack
	267 Phase Three—Attack
	268 Phase Four—Aftermath
	269 Phase Two—Preparation
	270 Phase Three—Attack
	271 Phase Three—Attack
	272 Phase Three—Attack
	273 Phase Three—Attack
	274 Phase Two—Preparation
	275 Phase Two—Preparation
	276 Phase Three—Attack
	277 Phase Three—Attack
	278 Phase Two—Preparation
	279 Phase Three—Attack
	280 Phase Three—Attack
	281 Phase Three—Attack
	282 Phase Two—Preparation
	283 Phase Three—Attack
	284 Phase Three—Attack
	285 Phase Two—Preparation
	286 Phase Three—Attack
	287 Phase Two—Preparation
	288 Phase Three—Attack
	289 Phase Two—Preparation
	290 Phase Three—Attack
	291 Phase Three—Attack
	292 Phase Three—Attack
	293 Phase Two—Preparation
	294 Phase Three—Attack
	295 Phase Four—Aftermath
	296 Phase Three—Attack
	297 Phase Three—Attack
	298 Phase Three—Attack
	299 Phase Three—Attack
	300 Phase Two—Preparation
	301 Phase Four—Aftermath
	302 Phase Two—Preparation
	303 Phase Two—Preparation
	304 Phase Two—Preparation
	305 Phase Three—Attack
	306 Phase Three—Attack
	307 Phase Three—Attack
	308 Phase Two—Preparation
	309 Phase Three—Attack
	310 Phase Two—Preparation
	311 Phase Three—Attack
	312 Phase Two—Preparation
	313 Phase Three—Attack
	314 Phase One—Prologue
	315 Phase Three—Attack
	316 Phase Three—Attack
	317 Phase Two—Preparation
	318 Phase Three—Attack
	319 Phase Two—Preparation
	320 Phase Two—Preparation
	321 Phase Three—Attack
	322 Phase Four—Aftermath
	323 Phase Two—Preparation
	324 Phase Two—Preparation
	325 Phase Three—Attack
	326 Phase Two—Preparation
	327 Phase Two—Preparation
	328 Phase Three—Attack
	329 Phase Three—Attack
	330 Phase Three—Attack
	331 Phase Two—Preparation
	332 Phase Four—Aftermath
	333 Phase Three—Attack
	334 Phase Three—Attack
	335 Phase Three—Attack
	336 Phase Two—Preparation
	337 Phase Three—Attack
	338 Phase Three—Attack
	339 Phase Three—Attack
	340 Phase Three—Attack
	341 Phase Three—Attack
	342 Phase Four—Aftermath
	343 Phase Three—Attack
	344 Phase Two—Preparation
	345 Phase Four—Aftermath
	346 Phase Two—Preparation
	347 Phase Two—Preparation
	348 Phase Three—Attack
	349 Phase Two—Preparation
	350 Phase Four—Aftermath
	351 Phase Two—Preparation
	352 Phase Two—Preparation
	353 Phase Two—Preparation
	354 Phase Two—Preparation
	355 Phase Three—Attack
	356 Phase Two—Preparation
	357 Phase Three—Attack
	358 Phase Four—Aftermath
	359 Phase Three—Attack
	360 Phase Two—Preparation
	361 Phase Four—Aftermath
	362 Phase Three—Attack
	363 Phase Four—Aftermath
	364 Phase Four—Aftermath
	365 Phase Three—Attack
	366 Phase Three—Attack
	367 Phase Two—Preparation
	368 Phase Four—Aftermath
Glossary
	Active Directory
	Air Gap
	Allow list
	Authentication/Authenticate
	Backdoor
	Block list
	Brute Forcing/Brute Force Attack
	Botnet
	Bug Bounty
	Business Email Compromise
	Chief Information Security Officer (CISO)
	CIA Triad
	Code
	Controls
	Credential Stuffing
	Crime as a Service
	Cryptomining
	Cyberinsurance
	Dark Web
	Data Breach
	Data Loss Prevention
	Data Packet
	DDoS
	Drive-By Compromise
	e-Commerce
	Encryption
	Event
	Firewall
	GDPR
	Hacktivist
	Honeypot
	Incident Response Plan
	Incident Response Retainer
	Information Security Policy
	Internal Audit
	Internet Protocol (IP) Address
	Intruder Detection System
	Keylogger
	Kill Switch
	Lanyard
	Logic Bomb
	Log
	Macro
	Mail Order Telephone Order
	Malicious Insider
	Malware
	Mitigation
	Multi-factor Authentication
	OSINT
	Packet
	Packet Filtering
	Patching
	Payload
	PCI DSS
	Penetration Testing
	Phishing
	Plain Text
	Port
	Privilege Escalation
	Ransomware
	Risk
	Risk Register
	Root Kit
	Script Kiddie
	Security Operations Centre (SOC)
	Server
	Shoulder Surfing
	Social Engineering
	Sophisticated Actor
	Stresser
	Supply Chain Attack
	Third Party
	Threat Actor
	Ticket
	Trojan
	Virus
	Vulnerability
	Vulnerability Scan
	Zero Day
Index




نظرات کاربران