|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Cybersicherheit entdecken: Eine technische Einführung für den absoluten Anfänger...

Artikelzustand:
Neuwertig
2 verfügbar
Preis:
US $45,94
Ca.CHF 41,98
Versand:
Kostenlos Economy Shipping. Weitere Detailsfür Versand
Standort: Jessup, Maryland, USA
Lieferung:
Lieferung zwischen Di, 4. Jun und Fr, 14. Jun nach 43230 bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahmen:
14 Tage Rückgabe. Käufer zahlt Rückversand. Weitere Details- Informationen zu Rückgaben
Zahlungen:
     

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. 

Angaben zum Verkäufer

Angemeldet als gewerblicher Verkäufer
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:386431186408
Zuletzt aktualisiert am 30. Apr. 2024 22:51:37 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neuwertig: Buch, das wie neu aussieht, aber bereits gelesen wurde. Der Einband weist keine ...
Book Title
Discovering Cybersecurity : A Technical Introduction for the Abso
ISBN
9781484295595
Publication Year
2023
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Discovering Cybersecurity : a Technical Introduction for the Absolute Beginner
Author
Seth James Nielson
Item Length
9.3in
Publisher
Apress L. P.
Item Width
6.1in
Item Weight
24.7 Oz
Number of Pages
Xiv, 443 Pages

Über dieses Produkt

Product Information

The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

Product Identifiers

Publisher
Apress L. P.
ISBN-10
1484295595
ISBN-13
9781484295595
eBay Product ID (ePID)
5060634906

Product Key Features

Author
Seth James Nielson
Publication Name
Discovering Cybersecurity : a Technical Introduction for the Absolute Beginner
Format
Trade Paperback
Language
English
Publication Year
2023
Type
Textbook
Number of Pages
Xiv, 443 Pages

Dimensions

Item Length
9.3in
Item Width
6.1in
Item Weight
24.7 Oz

Additional Product Features

Number of Volumes
1 Vol.
Lc Classification Number
Qa76.9.A25
Table of Content
Chapter 1: The Psychology of Cybersecurity Technology Chapter 2: Authentication Tech Foundations of Authentication The Big Three - Something You Know, Have, or Are Secure Password Storage How Hackers "Crack" Password Lists Chapter 3: Access Control Tech Foundations of Access Controls Mandatory vs Discretionary Access Controls BLP, BIBA, and Other Models RBAC and ABAC Chapter 4: Core Cryptography Tech Foundations of Cryptography Symmetric Cryptography Asymmetric Cryptography Certificates and PKI Chapter 5: Cryptography Application Tech Foundations of Cryptographic Applications Securing Data-At-Rest Securing Data-In-Motion Securing Data-In-Use Securing Composite States Chapter 6: Classical Host Security Tech Foundations of Host Security Malware: Viruses, Trojans, Ransomware Host Hardening Host IDS Technological Limits Chapter 7: Classical Network Security Tech Foundations of Network Security Border Security: Gateways, Firewalls, Proxies Virtual Private Network (VPN) Network IDS and IPS Physical Security Technological Limits Chapter 8: Web Security Tech Foundations of Web Security TLS Cookies, State, and Session Defenses API Security Domain Name Security Chapter 9: Email and Social Media Security Tech Foundations of Overlay Security Email-borne Malware Spam, Phishing, and Other Email Threats Social Media Threats Chapter 10: Cloud Security Tech Foundations of Cloud Security Authenticating and Authorizing Across Domains Multitenancy Security for Storage and Operations Availability Incident Response Chapter 11: Modern Security Tech Foundations of Classic Security Limitations Advanced Persistent Threats Zero-trust Networking Deception Technologies Data Privacy Techniques Chapter 12: Blockchain Tech Foundations of Blockchain Technology Peer-to-Peer Technology Distributed Ledgers Public and Private Ledgers Limitations of the Technology Cryptocurrencies Chapter 13: Current Events and Future Trends TODO: Decided closer to end-of-book Appendix A: Review of Computer Basics Appendix B: Review of Networking Basics
Copyright Date
2023
Topic
Security / General
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes
Genre
Computers

Artikelbeschreibung des Verkäufers

Great Book Prices Store

Great Book Prices Store

96,8% positive Bewertungen
1.2 Mio. Artikel verkauft
Shop besuchenKontakt
Antwortet meist innerhalb 24 Stunden

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten

Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
4.9
Kommunikation
4.8
Angemeldet als gewerblicher Verkäufer

Verkäuferbewertungen (342'189)

l***n (3917)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
Nice Book! Excellent Seller Fast Shipping A+A+A+
1***o (1583)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
.
2***k (371)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
Must have for any survivalist