Discovering Cybersecurity A Technical Introduction for the Absolute Beginner

The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protec...

Descripción completa

Detalles Bibliográficos
Autor principal: Nielson, Seth James (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2023.
Edición:1st ed. 2023.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009786705206719
Tabla de Contenidos:
  • Chapter 1: The Psychology of Cybersecurity
  • Chapter 2: Authentication Technology
  • Chapter 3: Authorization Technology
  • Chapter 4: Cryptography Foundations
  • Chapter 5: Core Cryptography Technology
  • Chapter 6: Cryptographic Systems Technology
  • Chapter 7: Host Security Technology
  • Chapter 8: Classical Network Security Technology
  • Chapter 9: World Wide Web Security
  • Chapter 10: Overlay Security: Email and Social Media
  • Appendix A: Binary and Hexadecimal Numbers
  • Appendix B: Computers, Data, and Programs
  • Appendix C: Computer Communications and Networking.