- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Cybersecurity is critical to protecting data, systems, and people. Whether you're new to the field, an IT professional strengthening your skills, or a manager shaping security policy, Foundations of Cybersecurity provides the knowledge and practice you need. Building on the first edition (Foundations of Information Security), this updated guide covers the essentials: authentication, authorization, and auditing; cryptography; security architecture; threat assessment; network and OS hardening; application and IoT security; incident response; compliance; and the human factors attackers exploit. You'll learn how to: Apply the core principles of security across systems and networks, Defend against emerging threats like AI-driven attacks and IoT vulnerabilities, Manage incident response and governance, risk, and compliance (GRC), Strengthen defenses against social engineering and insider threats, Explore career paths and skills for a future in cybersecurity. What's New in This Edition: Includes a new chapter on AI security, expanded coverage of security operations and governance, and practical 'Down the Rabbit Hole' labs in every chapter to help you practice real-world skills. Whether you're new to the field, strengthening your skills, or guiding a team, this book will help you build a solid foundation for protecting systems, data, and people.
Contents
Acknowledgments
Introduction
PART I: CORE PRINCIPLES
Chapter 1: What Is Cybersecurity?
Chapter 2: The Threat Landscape
Chapter 3: Identification and Authentication
Chapter 4: Authorization and Access Controls
Chapter 5: Auditing and Accountability
Chapter 6: Cryptography
PART II: ARCHITECTURE, INFRASTRUCTURE, AND SYSTEM SECURITY
Chapter 7: Security Architecture
Chapter 8: Network Security
Chapter 9: Operating System Security
Chapter 10: Mobile, Embedded, and Internet of Things Security
Chapter 11: Application Security
Chapter 12: AI Security
PART III: SECURITY OPERATIONS AND MANAGEMENT
Chapter 13: SecOps, the SOC, and Incident Response
Chapter 14: Governance, Risk, and Compliance
Chapter 15: Vulnerability Assessments and Penetration Testing
PART IV: HUMAN FACTORS AND PROFESSIONAL DEVELOPMENT
Chapter 16: Social Engineering
Chapter 17: Security Awareness
Chapter 18: So You Want to Be a Security Professional
Notes
Index
-
- 電子書籍
- 週プレNo.52 12/29号 週プレ
-
- 電子書籍
- だぶるぷれい 6



