Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Discovering cybersecurity = a techni...
~
Nielson, Seth James.
Linked to FindBook
Google Book
Amazon
博客來
Discovering cybersecurity = a technical introduction for the absolute beginner /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Discovering cybersecurity/ by Seth James Nielson.
Reminder of title:
a technical introduction for the absolute beginner /
Author:
Nielson, Seth James.
Published:
Berkeley, CA :Apress : : 2023.,
Description:
xiv, 443 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-1-4842-9560-1
ISBN:
9781484295601
Discovering cybersecurity = a technical introduction for the absolute beginner /
Nielson, Seth James.
Discovering cybersecurity
a technical introduction for the absolute beginner /[electronic resource] :by Seth James Nielson. - Berkeley, CA :Apress :2023. - xiv, 443 p. :ill., digital ;24 cm.
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
ISBN: 9781484295601
Standard No.: 10.1007/978-1-4842-9560-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / N54 2023
Dewey Class. No.: 005.8
Discovering cybersecurity = a technical introduction for the absolute beginner /
LDR
:03409nmm a2200349 a 4500
001
2390229
003
DE-He213
005
20231208113337.0
006
m d
007
cr nn 008maaau
008
250916s2023 cau s 0 eng d
020
$a
9781484295601
$q
(electronic bk.)
020
$a
9781484295595
$q
(paper)
024
7
$a
10.1007/978-1-4842-9560-1
$2
doi
035
$a
978-1-4842-9560-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
N54 2023
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N669 2023
100
1
$a
Nielson, Seth James.
$3
3414532
245
1 0
$a
Discovering cybersecurity
$h
[electronic resource] :
$b
a technical introduction for the absolute beginner /
$c
by Seth James Nielson.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiv, 443 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
520
$a
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9560-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9500993
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 N54 2023
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login