An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.
It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.
Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Duane C. Wilson is Founder and CEO of Wilson Innovative Solutions LLC, a firm that provides cybersecurity training, research, and consulting for businesses.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,17 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: Bellwetherbooks, McKeesport, PA, USA
paperback. Zustand: Very Good. Very Good Condition - May show some limited signs of wear and may have a remainder mark. Pages and dust cover are intact and not marred by notes or highlighting. Bestandsnummer des Verkäufers MIT-PBD-VG-S-0262542544
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 0.38. Bestandsnummer des Verkäufers G0262542544I5N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.38. Bestandsnummer des Verkäufers G0262542544I3N00
Anzahl: 1 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Very Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Bestandsnummer des Verkäufers 0262542544-8-1
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Duane C. Wilson is Founder and CEO of Wilson Innovative Solutions LLC, a firm that provides cybersecurity training, research, and consulting for businesses.An accessible guide to cybersecurity for the everyday user, covering cryptography and public k. Bestandsnummer des Verkäufers 437230731
Anzahl: 3 verfügbar
Anbieter: Books From California, Simi Valley, CA, USA
paperback. Zustand: Very Good. Bestandsnummer des Verkäufers mon0003785259
Anzahl: Mehr als 20 verfügbar
Anbieter: Books From California, Simi Valley, CA, USA
paperback. Zustand: Fine. Bestandsnummer des Verkäufers mon0003792384
Anzahl: 1 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape. Bestandsnummer des Verkäufers 9780262542548
Anzahl: 3 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -'An introduction to the major concepts in Cybersecurity that includes case examples and tips for individuals to protect themselves'--Libri GmbH, Europaallee 1, 36244 Bad Hersfeld 147 pp. Englisch. Bestandsnummer des Verkäufers 9780262542548
Anzahl: 2 verfügbar
Anbieter: Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. Neuware -An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics.It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants. The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures. In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use.Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information). He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware. He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology. Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape. 147 pp. Englisch. Bestandsnummer des Verkäufers 9780262542548
Anzahl: 1 verfügbar