Cybersecurity for Everyone
portes grátis
Cybersecurity for Everyone
Skillicorn, David B.
Taylor & Francis Ltd
08/2022
102
Mole
Inglês
9780367643393
15 a 20 dias
127
Descrição não disponível.
Preface
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Email
Web traffic
Blockchains
Summary
Index
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Web traffic
Blockchains
Summary
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
IP Address;Intrusion Detection Systems;Cybersecurity;DNS Server;Social life;Private Key;Digital signing;Public Key Encryption;Tcp;IoT Device;Web Server;Routing Table;Upload;Wo;Transmission Control Protocol;IoT;ICMP;Private Key Encryption;Publisher Nodes;Attack Graph;Certificate Authority's Public Key;Public Key;SQL Injection Attack;Decryption Key;Dark Web Sites;Played Back;DNS System;Remote Desktop Protocol
Preface
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Email
Web traffic
Blockchains
Summary
Index
Introduction
How cyberspace works
Encounters with cyberspace
What is cyberspace?
Nodes
People
Pipes
Configuration
Types of traffic
The Deep Web
The Dark Web
The World Wide Web
Social aspects
Governance
Security issues
Non-benign use of cyberspace
Encryption and hashing
Private key encryption
Public key encryption
Digital signing and digital hashing
Encryption in use
Node security
Getting access to nodes
Malware
What does malware do?
Direct attacks
Pipe security
IP
TCP
UDP
Attacks leveraging protocols
Countermeasures
Configuration security
Internet Control Message Protocol
Domain Name Service
Switch vulnerabilities
Mounting an attack
Defending against attacks
Recovery
Application security
Web traffic
Blockchains
Summary
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
IP Address;Intrusion Detection Systems;Cybersecurity;DNS Server;Social life;Private Key;Digital signing;Public Key Encryption;Tcp;IoT Device;Web Server;Routing Table;Upload;Wo;Transmission Control Protocol;IoT;ICMP;Private Key Encryption;Publisher Nodes;Attack Graph;Certificate Authority's Public Key;Public Key;SQL Injection Attack;Decryption Key;Dark Web Sites;Played Back;DNS System;Remote Desktop Protocol