Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issues so they are accessible to anyone from non-technical backgrounds.
Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position to do something about cybersecurity do not have the skills to understand the issues fully. Cybersecurity for Everyone is intended to help by describing the issues so they are accessible to anyone from non-technical backgrounds.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
David B. Skillicorn is Professor at the School of Computing, Queen's University, Canada. He was written extensively about security issues.
Inhaltsangabe
Preface Introduction How cyberspace works Encounters with cyberspace What is cyberspace? Nodes People Pipes Configuration Types of traffic The Deep Web The Dark Web The World Wide Web Social aspects Governance Security issues Non-benign use of cyberspace Encryption and hashing Private key encryption Public key encryption Digital signing and digital hashing Encryption in use Node security Getting access to nodes Malware What does malware do? Direct attacks Pipe security IP TCP UDP Attacks leveraging protocols Countermeasures Configuration security Internet Control Message Protocol Domain Name Service Switch vulnerabilities Mounting an attack Defending against attacks Recovery Application security Email Web traffic Blockchains Summary Index
Preface Introduction How cyberspace works Encounters with cyberspace What is cyberspace? Nodes People Pipes Configuration Types of traffic The Deep Web The Dark Web The World Wide Web Social aspects Governance Security issues Non-benign use of cyberspace Encryption and hashing Private key encryption Public key encryption Digital signing and digital hashing Encryption in use Node security Getting access to nodes Malware What does malware do? Direct attacks Pipe security IP TCP UDP Attacks leveraging protocols Countermeasures Configuration security Internet Control Message Protocol Domain Name Service Switch vulnerabilities Mounting an attack Defending against attacks Recovery Application security Email Web traffic Blockchains Summary Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826