Cybersecurity for Everyone
Autor David B. Skillicornen Limba Engleză Paperback – aug 2022
Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 105.03 lei 6-8 săpt. | +29.43 lei 6-12 zile |
CRC Press – aug 2022 | 105.03 lei 6-8 săpt. | +29.43 lei 6-12 zile |
Hardback (1) | 209.52 lei 3-5 săpt. | +17.23 lei 6-12 zile |
CRC Press – 10 dec 2020 | 209.52 lei 3-5 săpt. | +17.23 lei 6-12 zile |
Preț: 105.03 lei
Preț vechi: 162.86 lei
-36% Nou
Puncte Express: 158
Preț estimativ în valută:
20.10€ • 21.14$ • 16.79£
20.10€ • 21.14$ • 16.79£
Carte tipărită la comandă
Livrare economică 09-23 ianuarie 25
Livrare express 04-10 decembrie pentru 39.42 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367643393
ISBN-10: 0367643391
Pagini: 102
Dimensiuni: 138 x 216 x 12 mm
Greutate: 0.13 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 0367643391
Pagini: 102
Dimensiuni: 138 x 216 x 12 mm
Greutate: 0.13 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Cuprins
Preface
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Email
Web traffic
Blockchains
Summary
Index
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Web traffic
Blockchains
Summary
Index
Notă biografică
David B. Skillicorn is Professor at the School of Computing, Queen's University, Canada. He was written extensively about security issues.
Descriere
Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issues so they are accessible to anyone from non-technical backgrounds.