Network and Data Security for Non-Engineers: Technology for Non-Engineers
Autor Frank M. Groom, Kevin Groom, Stephan S. Jonesen Limba Engleză Paperback – 22 aug 2016
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 389.36 lei 6-8 săpt. | |
CRC Press – 22 aug 2016 | 389.36 lei 6-8 săpt. | |
Hardback (1) | 938.72 lei 6-8 săpt. | |
CRC Press – 2 aug 2017 | 938.72 lei 6-8 săpt. |
Preț: 389.36 lei
Preț vechi: 568.21 lei
-31% Nou
Puncte Express: 584
Preț estimativ în valută:
74.53€ • 80.14$ • 62.11£
74.53€ • 80.14$ • 62.11£
Carte tipărită la comandă
Livrare economică 21 decembrie 24 - 04 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781498767866
ISBN-10: 1498767869
Pagini: 273
Ilustrații: 121
Dimensiuni: 178 x 254 x 19 mm
Greutate: 0.52 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Technology for Non-Engineers
ISBN-10: 1498767869
Pagini: 273
Ilustrații: 121
Dimensiuni: 178 x 254 x 19 mm
Greutate: 0.52 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Technology for Non-Engineers
Public țintă
Professional Practice & DevelopmentCuprins
1. Introduction to Security Threats. 2. The Anthem Breach: A Case Study. 3. Anonymous Persistent Threats. 4. Creating Secure Code. 5. Providing a Secure Architecture. 6. The Nature of Hacking Attacks. 7. Malware, Viruses, Worms, Bugs, and Botnets. 8. Cryptography and the RSA Algorithm. 9. Browser Security. 10. Banking and Financial. 11. Web Application Security. 12. Web Security and DNS Security. 13. Network Security. 14. Network Defenses. 15. Denial of Service Attacks. 16. Mobile Platform Security. 17. Wireless Security. 18. The Stuxnet Worm: Zero Day Attacks. 19. Cyber-Warfare. 20. Conclusion.
Notă biografică
Stephan S. Jones, PhD, is the director of the Center for Information and Communication Sciences, where he is also a professor delivering core technology courses in the graduate-only program. His industry experience is as a field engineer and owner of a telecommunications company providing voice and data solutions for business/commercial systems in the Midwest. In academe, he has published or edited numerous books and texts associated with simplifying complex communication technologies for nonengineering students to comprehend. He is actively engaged in supporting broadband technology deployments to underserved and unserved regions of the country and providing technical support for non-profit organizations with student participation.
Frank Groom, PhD, is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs. Among his best known books are The Future of ATM and The ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin– Milwaukee in information systems. He is the former senior director of information systems for Ameritech.
Frank Groom, PhD, is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs. Among his best known books are The Future of ATM and The ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin– Milwaukee in information systems. He is the former senior director of information systems for Ameritech.
Descriere
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.