Discovering Cybersecurity
Apress (Verlag)
978-1-4842-9559-5 (ISBN)
What You Will Learn
Authentication technologies, including secure password storage and how hackers “crack” password lists
Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
Core cryptography technology, including AES encryption and public key signatures
Classical host security technologies that protect against malware (viruses, trojans, ransomware)
Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
Email and social media security threats such as spam, phishing, social media, and other email threats
Who This Book Is For
Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python.
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Erscheinungsdatum | 13.12.2023 |
---|---|
Zusatzinfo | 137 Illustrations, black and white; XIV, 443 p. 137 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | authentication • Blockchain • Cloud Security • cryptocurrencies • cybersecurity • Cybersecurity basics • Cybersecurity technology • Defensive Security • Offensive Security • Policy • Regulation • Security Deployment • Security Risk • Vendor Management • Zero trust security |
ISBN-10 | 1-4842-9559-5 / 1484295595 |
ISBN-13 | 978-1-4842-9559-5 / 9781484295595 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich