Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Discovering Cybersecurity
A Technical Introduction for the Absolute Beginner
Taschenbuch von Seth James Nielson
Sprache: Englisch

47,95 €*

-19 % UVP 58,84 €
inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-4 Werktage

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung
The contemporary IT landscape is littered with various technologies that vendors claim will ¿solve¿ an organization¿s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization¿s mission.
This book introduces major technologies that are employed in today¿s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

What You Will Learn

Authentication technologies, including secure password storage and how hackers ¿crack¿ password lists
Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
Core cryptography technology, including AES encryption and public key signatures
Classical host security technologies that protect against malware (viruses, trojans, ransomware)
Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
Email and social media security threats such as spam, phishing, social media, and other email threats

Who This Book Is For
Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
The contemporary IT landscape is littered with various technologies that vendors claim will ¿solve¿ an organization¿s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization¿s mission.
This book introduces major technologies that are employed in today¿s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

What You Will Learn

Authentication technologies, including secure password storage and how hackers ¿crack¿ password lists
Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
Core cryptography technology, including AES encryption and public key signatures
Classical host security technologies that protect against malware (viruses, trojans, ransomware)
Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
Email and social media security threats such as spam, phishing, social media, and other email threats

Who This Book Is For
Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Über den Autor
Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python.
Zusammenfassung

Helps you cut through the marketing from cybersecurity vendors to know what your organization really needs

Covers the capabilities and limitations that a cybersecurity tech gives to your security team

Shows you the technologies that hackers use to get into your organization so you can better mitigate risk

Inhaltsverzeichnis
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Details
Erscheinungsjahr: 2023
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xiv
443 S.
137 s/w Illustr.
443 p. 137 illus.
ISBN-13: 9781484295595
ISBN-10: 1484295595
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Nielson, Seth James
Auflage: First Edition
Hersteller: APRESS
Verantwortliche Person für die EU: APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com
Maße: 235 x 155 x 25 mm
Von/Mit: Seth James Nielson
Erscheinungsdatum: 09.12.2023
Gewicht: 0,692 kg
Artikel-ID: 126890026
Über den Autor
Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python.
Zusammenfassung

Helps you cut through the marketing from cybersecurity vendors to know what your organization really needs

Covers the capabilities and limitations that a cybersecurity tech gives to your security team

Shows you the technologies that hackers use to get into your organization so you can better mitigate risk

Inhaltsverzeichnis
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Details
Erscheinungsjahr: 2023
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xiv
443 S.
137 s/w Illustr.
443 p. 137 illus.
ISBN-13: 9781484295595
ISBN-10: 1484295595
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Nielson, Seth James
Auflage: First Edition
Hersteller: APRESS
Verantwortliche Person für die EU: APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com
Maße: 235 x 155 x 25 mm
Von/Mit: Seth James Nielson
Erscheinungsdatum: 09.12.2023
Gewicht: 0,692 kg
Artikel-ID: 126890026
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte