Mastering Cybersecurity : Strategies, Technologies, and Best Practices (First Edition. 2024. xxv, 776 S. XXV, 776 p. 1 illus. 235 mm)

個数:

Mastering Cybersecurity : Strategies, Technologies, and Best Practices (First Edition. 2024. xxv, 776 S. XXV, 776 p. 1 illus. 235 mm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9798868802966

Full Description

The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies.

Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world.

Understanding threats is just the start. The book also delves deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application.

Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like AI and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready.

What You Will Learn

The vast array of cyber threats, laying the groundwork for understanding the significance of cybersecurity
Various attack vectors, from malware and phishing to DDoS, giving readers a detailed understanding of potential threats
The psychological aspect of cyber threats, revealing how humans can be manipulated into compromising security
How information is encrypted and decrypted to preserve its integrity and confidentiality
The techniques and technologies that safeguard data being transferred across networks
Strategies and methods to protect online applications from threats
How to safeguard data and devices in an increasingly mobile-first world
The complexities of the complexities of cloud environments, offering tools and strategies to ensure data safety
The science behind investigating and analyzing cybercrimes post-incident
How to assess system vulnerabilities and how ethical hacking can identify weaknesses

Who this book is for:

CISOs, Learners, Educators, Professionals, Executives, Auditors, Boards of Directors, and more.

Contents

Chapter 1: Threat Landscape.- Chapter 2: Types of Cyber Attacks.- Chapter 3: Social Engineering.- Chapter 4: Cryptography.- Chapter 5: Network Security.- Chapter 6: Web Application Security.- Chapter 7: Mobile Security.-Chapter 8: Cloud Security.- Chapter 9: IoT Security.- Chapter 10: Digital Forensics.- Chapter 11: Vulnerability Assessment and Penetration Testing.- Chapter 12: Security Policies and Procedures.- Chapter 13: Data Privacy and Protection.- Chapter 14: Insider Threats.

最近チェックした商品