Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
50,10 €
Versandkostenfrei per Post / DHL
Lieferzeit 2-4 Werktage
Kategorien:
Beschreibung
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Über den Autor
Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python.
Zusammenfassung
Helps you cut through the marketing from cybersecurity vendors to know what your organization really needs
Covers the capabilities and limitations that a cybersecurity tech gives to your security team
Shows you the technologies that hackers use to get into your organization so you can better mitigate risk
Inhaltsverzeichnis
Chapter 1: The Psychology of Cybersecurity.- Chapter 2: Authentication Technology.- Chapter 3: Authorization Technology.- Chapter 4: Cryptography Foundations.- Chapter 5: Core Cryptography Technology.- Chapter 6: Cryptographic Systems Technology.- Chapter 7: Host Security Technology.- Chapter 8: Classical Network Security Technology.- Chapter 9: World Wide Web Security.- Chapter 10: Overlay Security: Email and Social Media.- Appendix A: Binary and Hexadecimal Numbers.- Appendix B: Computers, Data, and Programs.- Appendix C: Computer Communications and Networking.
Details
Erscheinungsjahr: | 2023 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xiv
443 S. 137 s/w Illustr. 443 p. 137 illus. |
ISBN-13: | 9781484295595 |
ISBN-10: | 1484295595 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Nielson, Seth James |
Auflage: | First Edition |
Hersteller: |
Apress
Apress L.P. |
Verantwortliche Person für die EU: | APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com |
Maße: | 235 x 155 x 25 mm |
Von/Mit: | Seth James Nielson |
Erscheinungsdatum: | 09.12.2023 |
Gewicht: | 0,692 kg |