語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cybersecurity fundamentals / Rajesh Kumar Goutam.
其他題名:
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
作者:
Goutam, Rajesh Kumar.
面頁冊數:
1 online resource (260 pages)
標題:
COMPUTERS / Internet / Online Safety & Privacy. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000233.html
ISBN:
9789390684731
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
Goutam, Rajesh Kumar.
Cybersecurity fundamentals
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /[electronic resource] :Rajesh Kumar Goutam. - 1 online resource (260 pages)
Includes bibliographical references and index.
Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Introduction to Cybersecurity -- Chapter 2. Cybersecurity Landscape and Its Challenges -- Chapter 3. Information Security and Intrusion Detection System -- Chapter 4. Cybercrime Source Identification Techniques -- Chapter 5. Stepping Stone Detection and Tracing System -- Chapter 6. Infra structuralVulnerabilities and DDoS Flooding Attacks -- Index.
Access restricted to authorized users and institutions.
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ÔCybersecurityÕ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
Mode of access: World Wide Web.
ISBN: 9789390684731Subjects--Topical Terms:
1483832
COMPUTERS / Internet / Online Safety & Privacy.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cybersecurity fundamentals = understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
LDR
:02834nam a2200289 i 4500
001
1157295
006
m eo d
007
cr cn |||m|||a
008
250717s2021 ob 000 0 eng d
020
$a
9789390684731
020
$a
9789390684748
035
$a
BPB0000233
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Goutam, Rajesh Kumar.
$3
1483874
245
1 0
$a
Cybersecurity fundamentals
$h
[electronic resource] :
$b
understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals /
$c
Rajesh Kumar Goutam.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2021.
264
4
$c
©2021
300
$a
1 online resource (260 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Cybersecurity fundamentals : understand the role of cybersecurity, its importance and modern techniques used by cybersecurity professionals -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Introduction to Cybersecurity -- Chapter 2. Cybersecurity Landscape and Its Challenges -- Chapter 3. Information Security and Intrusion Detection System -- Chapter 4. Cybercrime Source Identification Techniques -- Chapter 5. Stepping Stone Detection and Tracing System -- Chapter 6. Infra structuralVulnerabilities and DDoS Flooding Attacks -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ÔCybersecurityÕ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Internet / Online Safety & Privacy.
$2
bisacsh
$3
1483832
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000233.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入