Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Discovering Cybersecurity

Best Price (Coupon Required):
Buy Discovering Cybersecurity for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9781484295595
Condition
New
Product Description

The contemporary IT landscape is littered with various technologies that vendors claim will solve an organizations cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organizations mission. This book introduces major technologies that are employed in todays cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers crack password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Parallel Kinematics

Parallel Kinematics

$84.99
The Boy-Man, Masculinity and Immaturity in the Long Nineteenth Century

The Boy-Man, Masculinity and Immaturity in the Long Nineteenth Century

$169.99
Logic Synthesis and SOC Prototyping

Logic Synthesis and SOC Prototyping

$109.99
Houston Stewart Chamberlain

Houston Stewart Chamberlain

$39.99
The Travel Book: A Journey Through Every Country in the World by Lonely Planet

The Travel Book: A Journey Through Every Country in the World by Lonely Planet

$30.00
Stochastic Volatility in Financial Markets

Stochastic Volatility in Financial Markets

$84.99
7 Mighty Moves (30-copy pack)

7 Mighty Moves (30-copy pack)

$809.70
The Multi-Agent Programming Contest 2022

The Multi-Agent Programming Contest 2022

$64.99
Learning Discourse

Learning Discourse

$129.00
Nuclear Structure

Nuclear Structure

$39.99
Inverse Galois Theory

Inverse Galois Theory

$159.99
Salafismus

Salafismus

$39.99
Probleme des internationalen Enteignungs- und Whrungsrechts

Probleme des internationalen Enteignungs- und Whrungsrechts

$59.99
Belonging, Identity, Time and Young Peoples Engagement in the Middle Years of School

Belonging, Identity, Time and Young Peoples Engagement in the Middle Years of School

$54.99
Ecotones Between Forest and Grassland

Ecotones Between Forest and Grassland

$129.00
Progress in the Chemistry of Organic Natural Products 104

Progress in the Chemistry of Organic Natural Products 104

$249.99
Affective Dimensions of Fieldwork and Ethnography

Affective Dimensions of Fieldwork and Ethnography

$84.99
Creative Marketing

Creative Marketing

$84.99
Guide to Flow-Aware Networking

Guide to Flow-Aware Networking

$39.99
Hugo Grotius in International Thought

Hugo Grotius in International Thought

$54.99
Advances in Aeronautical Informatics

Advances in Aeronautical Informatics

$119.99
Innovations in Cyber Physical Systems

Innovations in Cyber Physical Systems

$249.99
Blickpunkt Gesellschaft 2

Blickpunkt Gesellschaft 2

$69.99
Vortrge der Bibliothek Warburg

Vortrge der Bibliothek Warburg

$59.99
Robotersysteme 1

Robotersysteme 1

$59.99
Identification Modeling and Characteristics of Miniature Rotorcraft

Identification Modeling and Characteristics of Miniature Rotorcraft

$169.99
Socialism in Russia

Socialism in Russia

$48.00
Translational Approaches to Autism Spectrum Disorder

Translational Approaches to Autism Spectrum Disorder

$129.00
Banking Sector Liberalization in India

Banking Sector Liberalization in India

$109.99
Ergebnisse der Inneren Medizin und Kinderheilkunde

Ergebnisse der Inneren Medizin und Kinderheilkunde

$59.99
Die Erdbeschreibung des Eudoxos von Knidos

Die Erdbeschreibung des Eudoxos von Knidos

$59.99
Drug Discovery and Development

Drug Discovery and Development

$189.00
Inscribed Bodies

Inscribed Bodies

$169.99
Romansy 14

Romansy 14

$109.99
Advanced Computing

Advanced Computing

$84.99
Design, Synthesis, Multifunctionalization and Biomedical Applications of Multifunctional Mesoporous

Design, Synthesis, Multifunctionalization and Biomedical Applications of Multifunctional Mesoporous

$54.99
Plant Tissue Culture and Its Bio-technological Application

Plant Tissue Culture and Its Bio-technological Application

$249.99
Motion Correction in Thoracic Positron Emission Tomography

Motion Correction in Thoracic Positron Emission Tomography

$54.99
Recent Trends in Educational Technology and Administration

Recent Trends in Educational Technology and Administration

$139.00
Foundations and Advances in Data Mining

Foundations and Advances in Data Mining

$129.00
previous
next