Discovering cybersecurity: A Technical Introduction for the Absolute Beginner
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide e...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York, NY
Apress
[2023]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484295601/?ar |
Zusammenfassung: | The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. |
Beschreibung: | Description based upon print version of record. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2024) |
Umfang: | 1 Online-Ressource (447 Seiten) |
ISBN: | 9781484295601 1484295609 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100067514 | ||
003 | DE-627-1 | ||
005 | 20240228122118.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240104s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781484295601 |c electronic book |9 978-1-4842-9560-1 | ||
020 | |a 1484295609 |c electronic book |9 1-4842-9560-9 | ||
035 | |a (DE-627-1)100067514 | ||
035 | |a (DE-599)KEP100067514 | ||
035 | |a (ORHE)9781484295601 | ||
035 | |a (DE-627-1)100067514 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23/eng/20231219 | |
100 | 1 | |a Nielson, Seth James |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Discovering cybersecurity |b A Technical Introduction for the Absolute Beginner |c Seth James Nielson |
264 | 1 | |a New York, NY |b Apress |c [2023] | |
300 | |a 1 Online-Ressource (447 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2024) | ||
520 | |a The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
776 | 1 | |z 9781484295595 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484295595 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484295601/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100067514 |
---|---|
_version_ | 1821494935757520896 |
adam_text | |
any_adam_object | |
author | Nielson, Seth James |
author_facet | Nielson, Seth James |
author_role | aut |
author_sort | Nielson, Seth James |
author_variant | s j n sj sjn |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100067514 (DE-599)KEP100067514 (ORHE)9781484295601 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03797cam a22004212 4500</leader><controlfield tag="001">ZDB-30-ORH-100067514</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122118.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240104s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484295601</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-4842-9560-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484295609</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-4842-9560-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100067514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100067514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484295601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100067514</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20231219</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nielson, Seth James</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Discovering cybersecurity</subfield><subfield code="b">A Technical Introduction for the Absolute Beginner</subfield><subfield code="c">Seth James Nielson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (447 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484295595</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484295595</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484295601/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100067514 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:17Z |
institution | BVB |
isbn | 9781484295601 1484295609 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (447 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Apress |
record_format | marc |
spelling | Nielson, Seth James VerfasserIn aut Discovering cybersecurity A Technical Introduction for the Absolute Beginner Seth James Nielson New York, NY Apress [2023] 1 Online-Ressource (447 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based upon print version of record. - Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on January 17, 2024) The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. Computer security Sécurité informatique 9781484295595 Erscheint auch als Druck-Ausgabe 9781484295595 |
spellingShingle | Nielson, Seth James Discovering cybersecurity A Technical Introduction for the Absolute Beginner Computer security Sécurité informatique |
title | Discovering cybersecurity A Technical Introduction for the Absolute Beginner |
title_auth | Discovering cybersecurity A Technical Introduction for the Absolute Beginner |
title_exact_search | Discovering cybersecurity A Technical Introduction for the Absolute Beginner |
title_full | Discovering cybersecurity A Technical Introduction for the Absolute Beginner Seth James Nielson |
title_fullStr | Discovering cybersecurity A Technical Introduction for the Absolute Beginner Seth James Nielson |
title_full_unstemmed | Discovering cybersecurity A Technical Introduction for the Absolute Beginner Seth James Nielson |
title_short | Discovering cybersecurity |
title_sort | discovering cybersecurity a technical introduction for the absolute beginner |
title_sub | A Technical Introduction for the Absolute Beginner |
topic | Computer security Sécurité informatique |
topic_facet | Computer security Sécurité informatique |
work_keys_str_mv | AT nielsonsethjames discoveringcybersecurityatechnicalintroductionfortheabsolutebeginner |