語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Discovering cybersecurity = a techni...
~
Nielson, Seth James.
FindBook
Google Book
Amazon
博客來
Discovering cybersecurity = a technical introduction for the absolute beginner /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Discovering cybersecurity/ by Seth James Nielson.
其他題名:
a technical introduction for the absolute beginner /
作者:
Nielson, Seth James.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xiv, 443 p. :ill., digital ;24 cm.
內容註:
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-9560-1
ISBN:
9781484295601
Discovering cybersecurity = a technical introduction for the absolute beginner /
Nielson, Seth James.
Discovering cybersecurity
a technical introduction for the absolute beginner /[electronic resource] :by Seth James Nielson. - Berkeley, CA :Apress :2023. - xiv, 443 p. :ill., digital ;24 cm.
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
ISBN: 9781484295601
Standard No.: 10.1007/978-1-4842-9560-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / N54 2023
Dewey Class. No.: 005.8
Discovering cybersecurity = a technical introduction for the absolute beginner /
LDR
:03409nmm a2200349 a 4500
001
2390229
003
DE-He213
005
20231208113337.0
006
m d
007
cr nn 008maaau
008
250916s2023 cau s 0 eng d
020
$a
9781484295601
$q
(electronic bk.)
020
$a
9781484295595
$q
(paper)
024
7
$a
10.1007/978-1-4842-9560-1
$2
doi
035
$a
978-1-4842-9560-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
N54 2023
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N669 2023
100
1
$a
Nielson, Seth James.
$3
3414532
245
1 0
$a
Discovering cybersecurity
$h
[electronic resource] :
$b
a technical introduction for the absolute beginner /
$c
by Seth James Nielson.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiv, 443 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking.
520
$a
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9560-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9500993
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 N54 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入