Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherAuerbach Publishers, Incorporated
ISBN-10113844040X
ISBN-139781138440401
eBay Product ID (ePID)18038544825
Product Key Features
Number of Pages344 Pages
LanguageEnglish
Publication NameCyber Security Essentials
Publication Year2017
SubjectSecurity / General, Management, Information Technology
TypeTextbook
Subject AreaComputers, Business & Economics
AuthorRyan Olson
FormatHardcover
Dimensions
Item Weight23.4 Oz
Item Length9.2 in
Item Width6.1 in
Additional Product Features
Intended AudienceScholarly & Professional
Dewey Edition23
IllustratedYes
Dewey Decimal005.8
Table Of ContentCyber Security Fundamentals. Network and Security Concepts. Microsoft Windows Security Principles. Attacker Techniques and Motivations. How Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection, Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating Malicious Code. Evading Detection and Elevating Privileges. Stealing Information and Exploitation. Defense and Analysis Techniques. Memory Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code Analysis Systems. Intrusion Detection Systems. iDefense Special File Investigation Tools.
SynopsisThe sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon., A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability.