Cybersecurity and Identity Access Management
Autor Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peteren Limba Engleză Hardback – 29 iun 2022
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 458.51 lei 22-36 zile | +18.40 lei 5-11 zile |
Springer Nature Singapore – 30 iun 2023 | 458.51 lei 22-36 zile | +18.40 lei 5-11 zile |
Hardback (1) | 629.35 lei 22-36 zile | +22.68 lei 5-11 zile |
Springer Nature Singapore – 29 iun 2022 | 629.35 lei 22-36 zile | +22.68 lei 5-11 zile |
Preț: 629.35 lei
Preț vechi: 786.69 lei
-20% Nou
Puncte Express: 944
Preț estimativ în valută:
120.44€ • 125.11$ • 100.05£
120.44€ • 125.11$ • 100.05£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Livrare express 27 decembrie 24 - 02 ianuarie 25 pentru 32.67 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811926570
ISBN-10: 9811926573
Ilustrații: X, 236 p. 86 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.53 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Locul publicării:Singapore, Singapore
ISBN-10: 9811926573
Ilustrații: X, 236 p. 86 illus., 79 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.53 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Locul publicării:Singapore, Singapore
Cuprins
Cybersecurity for Beginners.- The Basics of Hacking and Penetration Testing.- Hacking for Dummies.- Networking All-in-One for Dummies.- Effective Cyber Security.- Malware.- Firewalls.- Cryptography.- Control physical and logical access to assets.- Manage the Identification and Authentication of People, Devices, And Services.- Integrate Identity as A Third-Party Service.- Implement and Manage Authorization Mechanisms.- Managing the Identity and Access Provisioning Life Cycle.- Conduct Security Control Testing.- Collect Security Process Data.- Recovery Strategies for Database.- Analyze Test Output and Generate A Report.- Ensure Appropriate Asset Retention.- Determine Information and Security Controls.
Notă biografică
Dr. Bharat S. Rawal (D.Sc.-SM-IEEE) is currently serving as Department Chair of Computer and Data Science & Full Professor at Capitol Technology University, Laurel, MD. Before Joining Capitol Technology University , he served as an Associate Professor and Program Director for Cybersecurity & Cyber Engineering programs at Gannon University at Erie, PA. and an Assistant professor in the Department of Information Sciences and Technologies, Pennsylvania State University, Abington. Before joining Penn State, he was at Duke University as Visiting Assistant Professor. His research interests include cyberspace security, networking, and Blockchain. Prior to entering academia, Dr. Rawal has served as a CEO for the Pharmaceutical and Cyber Security industries. He has published around 100 of articles in journals and conference proceedings. His area of research interest is, Networking, Network Security, Blockchain, HPC and AI. He is a Guest Editor for variousinternational journals including Springer, Elsevier, Intercedence, IGI, Taylor Francis.
Dr. Gunasekaran Manogaran received the B.E. degree in computer science from Anna University, Chennai, Tamil Nadu, India, in 2010, and the M.Tech. and Ph.D. degrees in information technology from Vellore Institute of Technology, Vellore, Tamil Nadu, India, in 2012 and 2017, respectively., He is currently working as a Visiting Researcher in Computer and Information Science Department, Gannon University, Erie, USA. He was worked as a Big Data Scientist with the University of California, Davis, CA, USA. He has worked as a Research Assistant for a project on spatial data mining funded by the Indian Council of Medical Research, Government of India. He has authored/coauthored papers in conferences, book chapters, and journals. His current research interests include data mining, big data analytics, and soft computing. Dr. Manogaran is a member of the International Society for Infectious Diseases and Machine Intelligence Research labs. He is on the reviewer board of several international journals and has been a member of the Program Committee for several international/national conferences and workshops. He is a Co-Investigator for the project entitled Agent Based Modeling of HIV epidemic in state of Telangana, India¡± funded by Pitt Public Health, Pittsburgh University, USA. He currently serves on Technical Program Committee for 2018 IEEE International Conference on Consumer Electronics (ICCE) in Las Vegas, USA. He is the Guest Editor for various international journals including IEEE, Springer, Elsevier, Intercedence, IGI, Taylor Francis and Emerald publishing. He is the recipient of an award for Young Investigator from India and Southeast Asia by Bill and Melinda Gates Foundation, USA.
Dr. Alexander Peter is an award-winning hands-on Senior Executive and Board Member with more than 20 years of success ac^ understand wisdom (unsupervised). Leveraging extensive experience in big data management and intelligent process optimization/automation, he is a valuable advisor for an organization looking to develop their KPI, scorecards, and/or executive dashboard. His broad areas of expertise include business intelligence, artificial intelligence, data management/engineering, cloud/mobile computing and Cryptocurrency/Blockchain, managing Bitcoin, and Ethereum smart contract mining hardware using over 1 Ph/s - 1000 Trillion Hashes per second infrastructure.
Textul de pe ultima copertă
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage.
This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
Caracteristici
Discusses the different third-party attacks and hacking processe Maximizes reader insights into effective cyber security, malware, firewalls and cryptography Simplifies a complicated picture into hacking and penetration testing