Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cybersecurity fundamentals / Rajesh Kumar Goutam.
Reminder of title:
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
Author:
Goutam, Rajesh Kumar.
Description:
1 online resource (260 pages)
Subject:
COMPUTERS / Networking / Network Protocols. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000233.html
ISBN:
9789390684731
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
Goutam, Rajesh Kumar.
Cybersecurity fundamentals
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /[electronic resource] :Rajesh Kumar Goutam. - 1 online resource (260 pages)
Includes bibliographical references and index.
Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Introduction to Cybersecurity -- Chapter 2. Cybersecurity Landscape and Its Challenges -- Chapter 3. Information Security and Intrusion Detection System -- Chapter 4. Cybercrime Source Identification Techniques -- Chapter 5. Stepping Stone Detection and Tracing System -- Chapter 6. Infra structuralVulnerabilities and DDoS Flooding Attacks -- Index.
Access restricted to authorized users and institutions.
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ÔCybersecurityÕ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
Mode of access: World Wide Web.
ISBN: 9789390684731Subjects--Topical Terms:
1483839
COMPUTERS / Networking / Network Protocols.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
LDR
:02834nam a2200289 i 4500
001
1157295
006
m eo d
007
cr cn |||m|||a
008
250717s2021 ob 000 0 eng d
020
$a
9789390684731
020
$a
9789390684748
035
$a
BPB0000233
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Goutam, Rajesh Kumar.
$3
1483874
245
1 0
$a
Cybersecurity fundamentals
$h
[electronic resource] :
$b
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
$c
Rajesh Kumar Goutam.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2021.
264
4
$c
©2021
300
$a
1 online resource (260 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Introduction to Cybersecurity -- Chapter 2. Cybersecurity Landscape and Its Challenges -- Chapter 3. Information Security and Intrusion Detection System -- Chapter 4. Cybercrime Source Identification Techniques -- Chapter 5. Stepping Stone Detection and Tracing System -- Chapter 6. Infra structuralVulnerabilities and DDoS Flooding Attacks -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ÔCybersecurityÕ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Internet / Online Safety & Privacy.
$2
bisacsh
$3
1483832
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000233.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login