28,99 €
28,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
28,99 €
28,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
28,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
28,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles.
From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll
…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 2.84MB
  • FamilySharing(5)
Produktbeschreibung
Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles.
From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches.
From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure.
By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Soledad Antelada Toledano, a leading cybersecurity trailblazer, currently serves as security technical program manager at the Office of the CISO at Google. Her career took off at Berkeley Lab, a key player in internet development and scientific research, where she also contributed significantly to NERSC's cybersecurity. Soledad further made her mark as the head of security for the ACM/IEEE Supercomputing Conference, overseeing SCinet's network architecture. She founded GirlsCanHack, advocating for women in cybersecurity. Recognized as one of the 20 Most Influential Latinos in Technology in America in 2016, Soledad is a notable figure in promoting diversity and innovation in cybersecurity.