Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Discovering Cybersecurity

Best Price (Coupon Required):
Buy Discovering Cybersecurity for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484295595
Condition
New
Product Description

The contemporary IT landscape is littered with various technologies that vendors claim will solve an organizations cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organizations mission. This book introduces major technologies that are employed in todays cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers crack password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Social Media im Unternehmen  Ruhm oder Ruin

Social Media im Unternehmen Ruhm oder Ruin

$29.99
Advances in Chemical Reaction Dynamics

Advances in Chemical Reaction Dynamics

$39.99
Lassa Fever: Epidemiology, Immunology, Diagnostics, and Therapeutics

Lassa Fever: Epidemiology, Immunology, Diagnostics, and Therapeutics

$139.00
In the Footsteps of Giorgio Philip Szeg

In the Footsteps of Giorgio Philip Szeg

$149.00
Handbuch Automobilbanken

Handbuch Automobilbanken

$69.99
Lebenszyklusrendite von Immobilien

Lebenszyklusrendite von Immobilien

$79.99
A Sled for Gabo

A Sled for Gabo

$6.71
Environment and Society

Environment and Society

$99.99
VLSI Placement and Global Routing Using Simulated Annealing

VLSI Placement and Global Routing Using Simulated Annealing

$129.00
The Radical Choice and Moral Theory

The Radical Choice and Moral Theory

$84.99
Oculoplastic Surgery

Oculoplastic Surgery

$69.99
HOAI Textausgabe / Text Edition

HOAI Textausgabe / Text Edition

$54.99
Universities in the Neoliberal Era

Universities in the Neoliberal Era

$119.99
High Field Brain MRI

High Field Brain MRI

$129.00
ber die Reaktionsweise von Kupfer- und Chromsalzen mit Gelatine und Gelatinehydrolysaten

ber die Reaktionsweise von Kupfer- und Chromsalzen mit Gelatine und Gelatinehydrolysaten

$49.99
Memories on the Move

Memories on the Move

$139.99
Robustness-Related Issues in Speaker Recognition

Robustness-Related Issues in Speaker Recognition

$39.99
Allocating Taxing Powers within the European Union

Allocating Taxing Powers within the European Union

$109.99
Reservations to Human Rights Treaties and the Vienna Convention Regime

Reservations to Human Rights Treaties and the Vienna Convention Regime

$54.99
Integrated Coastal Resilience

Integrated Coastal Resilience

$54.99

"Das Band der ewigen Liebe"

$29.99
Modern Privacy

Modern Privacy

$54.99
Operations Research mit BASIC auf dem IBM PC

Operations Research mit BASIC auf dem IBM PC

$69.99
Einfhrung in die Anwendung des Betriebssystems CP/M

Einfhrung in die Anwendung des Betriebssystems CP/M

$69.99
Recent Trends in Regeneration Research

Recent Trends in Regeneration Research

$39.99
Fuzzy Logic and Applications

Fuzzy Logic and Applications

$54.99
D. Martin Luthers Werke 4. Abteilung, Teil 2

D. Martin Luthers Werke 4. Abteilung, Teil 2

$749.00
Philosophie und Physik

Philosophie und Physik

$59.99
Game Theory

Game Theory

$99.99
The Stonecutter

The Stonecutter

$6.50
Current Trends in Microbial Biotechnology for Sustainable Agriculture

Current Trends in Microbial Biotechnology for Sustainable Agriculture

$279.99
Game Theory for Data Science

Game Theory for Data Science

$39.99
Method Acting Reconsidered

Method Acting Reconsidered

$64.99
E-business Technology and Strategy

E-business Technology and Strategy

$54.99
Bipolar Disorders

Bipolar Disorders

$129.00
Video Coding with Superimposed Motion-Compensated Signals

Video Coding with Superimposed Motion-Compensated Signals

$84.99
Fuzzy-Logik und Fuzzy-Control

Fuzzy-Logik und Fuzzy-Control

$49.99
Carcinoma of the Prostate

Carcinoma of the Prostate

$84.99
Explosion Risk of Solid Biofuels

Explosion Risk of Solid Biofuels

$54.99
Science Education and Curriculum in South Africa

Science Education and Curriculum in South Africa

$19.99
previous
next