語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Discovering cybersecurity = a technical introduction for the absolute beginner /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Discovering cybersecurity/ by Seth James Nielson.
其他題名:
a technical introduction for the absolute beginner /
作者:
Nielson, Seth James.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xiv, 443 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-9560-1
ISBN:
9781484295601
Discovering cybersecurity = a technical introduction for the absolute beginner /
Nielson, Seth James.
Discovering cybersecurity
a technical introduction for the absolute beginner /[electronic resource] :by Seth James Nielson. - Berkeley, CA :Apress :2023. - xiv, 443 p. :ill., digital ;24 cm.
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
ISBN: 9781484295601
Standard No.: 10.1007/978-1-4842-9560-1doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25 / N54 2023
Dewey Class. No.: 005.8
Discovering cybersecurity = a technical introduction for the absolute beginner /
LDR
:03409nam a2200349 a 4500
001
1120575
003
DE-He213
005
20231208113337.0
006
m d
007
cr nn 008maaau
008
240612s2023 cau s 0 eng d
020
$a
9781484295601
$q
(electronic bk.)
020
$a
9781484295595
$q
(paper)
024
7
$a
10.1007/978-1-4842-9560-1
$2
doi
035
$a
978-1-4842-9560-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
N54 2023
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N669 2023
100
1
$a
Nielson, Seth James.
$e
author.
$3
1297410
245
1 0
$a
Discovering cybersecurity
$h
[electronic resource] :
$b
a technical introduction for the absolute beginner /
$c
by Seth James Nielson.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiv, 443 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
520
$a
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Computer security.
$3
557122
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9560-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入