• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • 0
    Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner

    Discovering Cybersecurity by Nielson, Seth James;

    A Technical Introduction for the Absolute Beginner

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 58.84
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        24 959 Ft (23 771 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 4 992 Ft off)
      • Discounted price 19 968 Ft (19 017 Ft + 5% áfa)

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadás sorszáma First Edition
    • Kiadó Apress
    • Megjelenés dátuma 2023. december 9.
    • Kötetek száma 1 pieces, Book

    • ISBN 9781484295595
    • Kötéstípus Puhakötés
    • Terjedelem443 oldal
    • Méret 235x155 mm
    • Súly 700 g
    • Nyelv angol
    • Illusztrációk 137 Illustrations, black & white
    • 561

    Kategóriák

    Rövid leírás:

    The contemporary IT landscape is littered with various technologies that vendors claim will ?solve? an organization?s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization?s mission.

    This book introduces major technologies that are employed in today?s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

    What You Will Learn

    • Authentication technologies, including secure password storage and how hackers ?crack? password lists
    • Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
    • Core cryptography technology, including AES encryption and public key signatures
    • Classical host security technologies that protect against malware (viruses, trojans, ransomware)
    • Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
    • Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
    • Email and social media security threats such as spam, phishing, social media, and other email threats

    Több

    Hosszú leírás:

    The contemporary IT landscape is littered with various technologies that vendors claim will ?solve? an organization?s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization?s mission.

    This book introduces major technologies that are employed in today?s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.



    What You Will Learn



    • Authentication technologies, including secure password storage and how hackers ?crack? password lists
    • Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
    • Core cryptography technology, including AES encryption and public key signatures
    • Classical host security technologies that protect against malware (viruses, trojans, ransomware)
    • Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
    • Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
    • Email and social media security threats such as spam, phishing, social media, and other email threats





















    Who This Book Is For

    Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

    Több

    Tartalomjegyzék:

    Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.

    Több
    Mostanában megtekintett
    previous
    Tempus ? The World of Discussion and the World of Narration: The World of Discussion and the World of Narration

    Tempus ? The World of Discussion and the World of Narration: The World of Discussion and the World of Narration

    Weinrich, Herald; Brown, Jane K.; Brown, Marshall;

    14 165 Ft

    Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner

    Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner

    Nielson, Seth James;

    24 959 Ft

    Slouching Towards Utopia: An Economic History of the Twentieth Century

    Slouching Towards Utopia: An Economic History of the Twentieth Century

    Long, Brad de;

    10 122 Ft

    next