Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Discovering Cybersecurity

Discovering Cybersecurity

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484295595
Condition
New
Product Description

The contemporary IT landscape is littered with various technologies that vendors claim will solve an organizations cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organizations mission. This book introduces major technologies that are employed in todays cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers crack password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

Available Colors
Available Sizes
1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon Get Coupon & BUY

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$39.99 $39.99

10% OFF
This deals requires coupon Get Code Here
$36.00
See Site In stock Visit Store

Similar Products

Gemini Flies!

$49.99

Theoretische Grundlagen der Stabilitt technischer Systeme

$59.99

Infection Control in the ICU Environment

$169.99

Entwurf hydraulischer Maschinen

$169.99

Proceedings of the 18th International Symposium on Advancement of Construction Management and Real E

$219.99

Adaptive Dynamic Programming for Control

$129.00

Plasmaphysik

$69.99

The New Politics of Youth Crime

$54.99

Discrete Distributions in Engineering and the Applied Sciences

$64.99

The Bridge to a Global Middle Class

$219.99

Chemistry and Physics of Solid Surfaces VI

$39.99

China and the Global Political Economy

$109.99

Das Phnomenologische und das Symbolische

$89.99

Dritte Welt und westliche Zivilisation

$54.99

Mesozoic Stratigraphy of India

$129.00

Fine- and Coarse-Grain Reconfigurable Computing

$109.99

Mechanics of Composite and Multi-functional Materials, Volume 5

$169.00

Wrmebertragung auf eine Flugstaubstrmung im senkrechten Rohr sowie auf eine durchstrmte Schttgu

$59.99

Joint Models of Neural and Behavioral Data

$84.99

Political Community in Minority Language Writing

$129.99

Vertriebsprozesse mit SAP ERP

$64.99

Self, Identity, and Social Institutions

$54.99

Cable Television

$109.99

Lychee Disease Management

$199.99

Numerische Optimierung der Bearbeitungsbedingungen whrend des Drehvorganges

$59.99

Betriebslehre und Schriftverkehr der Drogerie

$59.99

Applied Multivariate Statistics with R

$49.99

Individualising Risk

$129.99

Understanding Pottery Function

$54.99

Global Call Center Employees in India

$54.99

G.W. Stewart

$169.99

Contemporary Research in Accounting and Finance

$179.99

Bioelectricity

$169.99

Modern Developments and Applications in Microbeam Analysis

$109.99

Literature in Language Education

$89.00

Temporre An- und Abwesenheiten in lndlichen Rumen

$59.99

Image Processing in Diabetic Related Causes

$39.99

Fisheries Acoustics

$219.99

Die Deutsch-Ostafrikanische Centralbahn

$59.99

Where Did My Roommate Put My Charger?: A Kind-Of Activity Book for Kind-Of Adults by Sarah Kempa

$14.99