Taming the Hacking Storm
Taming the Hacking Storm
A Framework for Defeating Hackers and Malware
Grimes, Roger A.
John Wiley & Sons Inc
04/2025
336
Mole
Inglês
9781394349586
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Table of Contents
About the Author
Preface
About This Book
Acknowledgments
Chapter Summaries
Part I: Identifying the Problem
Chapter 1: How Bad Is Internet Security?
Chapter 2: How We Are Attacked and Why
Chapter 3: The Problem
Chapter 4: Challenges
Part II: The Technology Solution
Chapter 5: The Solution
Chapter 6: Technology Solution Summary
Chapter 7: Trusted Identity
Chapter 8: Safe and Trusted Devices
Chapter 9: Trusted OS and Apps
Chapter 10: Trusted Networks
Chapter 11: Trust Assurance Service
Chapter 12: Internet Security Global Alliance
Part III: Challenging the Solution
Chapter 13: Threat Modeling
Chapter 14: Common Questions
Part IV: Other Needed Solutions
Chapter 15: Secure Coding
Chapter 16: Better Patching
Chapter 17: Getting International Agreements
Chapter 18: What You Can Do
Index
About the Author
Preface
About This Book
Acknowledgments
Chapter Summaries
Part I: Identifying the Problem
Chapter 1: How Bad Is Internet Security?
Chapter 2: How We Are Attacked and Why
Chapter 3: The Problem
Chapter 4: Challenges
Part II: The Technology Solution
Chapter 5: The Solution
Chapter 6: Technology Solution Summary
Chapter 7: Trusted Identity
Chapter 8: Safe and Trusted Devices
Chapter 9: Trusted OS and Apps
Chapter 10: Trusted Networks
Chapter 11: Trust Assurance Service
Chapter 12: Internet Security Global Alliance
Part III: Challenging the Solution
Chapter 13: Threat Modeling
Chapter 14: Common Questions
Part IV: Other Needed Solutions
Chapter 15: Secure Coding
Chapter 16: Better Patching
Chapter 17: Getting International Agreements
Chapter 18: What You Can Do
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cybersecurity; cybersecurity book; internet security; online security; online privacy; internet privacy; online identity verification; threat modeling; cybercrime; cybercrime solutions; cybercrime book; malware solutions; hacking solutions
Table of Contents
About the Author
Preface
About This Book
Acknowledgments
Chapter Summaries
Part I: Identifying the Problem
Chapter 1: How Bad Is Internet Security?
Chapter 2: How We Are Attacked and Why
Chapter 3: The Problem
Chapter 4: Challenges
Part II: The Technology Solution
Chapter 5: The Solution
Chapter 6: Technology Solution Summary
Chapter 7: Trusted Identity
Chapter 8: Safe and Trusted Devices
Chapter 9: Trusted OS and Apps
Chapter 10: Trusted Networks
Chapter 11: Trust Assurance Service
Chapter 12: Internet Security Global Alliance
Part III: Challenging the Solution
Chapter 13: Threat Modeling
Chapter 14: Common Questions
Part IV: Other Needed Solutions
Chapter 15: Secure Coding
Chapter 16: Better Patching
Chapter 17: Getting International Agreements
Chapter 18: What You Can Do
Index
About the Author
Preface
About This Book
Acknowledgments
Chapter Summaries
Part I: Identifying the Problem
Chapter 1: How Bad Is Internet Security?
Chapter 2: How We Are Attacked and Why
Chapter 3: The Problem
Chapter 4: Challenges
Part II: The Technology Solution
Chapter 5: The Solution
Chapter 6: Technology Solution Summary
Chapter 7: Trusted Identity
Chapter 8: Safe and Trusted Devices
Chapter 9: Trusted OS and Apps
Chapter 10: Trusted Networks
Chapter 11: Trust Assurance Service
Chapter 12: Internet Security Global Alliance
Part III: Challenging the Solution
Chapter 13: Threat Modeling
Chapter 14: Common Questions
Part IV: Other Needed Solutions
Chapter 15: Secure Coding
Chapter 16: Better Patching
Chapter 17: Getting International Agreements
Chapter 18: What You Can Do
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.