Discovering Cybersecurity : A Technical Introduction for the Absolute Beginner (1st)

個数:
電子版価格
¥10,720
  • 電子版あり
  • ポイントキャンペーン

Discovering Cybersecurity : A Technical Introduction for the Absolute Beginner (1st)

  • ウェブストア価格 ¥10,432(本体¥9,484)
  • APress(2023/10発売)
  • 外貨定価 US$ 54.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 470pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 330 p.
  • 言語 ENG
  • 商品コード 9781484295595

Full Description

The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission.This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

What You Will Learn

Authentication technologies, including secure password storage and how hackers "crack" password lists
Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
Core cryptography technology, including AES encryption and public key signatures
Classical host security technologies that protect against malware (viruses, trojans, ransomware)
Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
Email and social media security threats such as spam, phishing, social media, and other email threats

Who This Book Is For

Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

Contents

Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.

最近チェックした商品