12.03.2021 Views

⚡Download✔[PDF]⚡ Cybersecurity: An Introduction

Copy Link and Open in New Tab Get Book : https://reader.softebook.net/savelibrary/1683922034 Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that emphasizes not only techniques but also the mindset. The book includes an introduction to networks, backups, history of the field, career information, and a glossary of key terms including US government acronyms. Emphasizing the key components of information security, key topics include physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, and sandboxing.Features:• Examples to help the reader learn to identify suspect activity• Promotes an approach that emphasizes preparation and prevention while describing the tools and techniques in detection of problems and steps for recoverySelected Topics:Physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operatio

Copy Link and Open in New Tab
Get Book : https://reader.softebook.net/savelibrary/1683922034
Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that emphasizes not only techniques but also the mindset. The book includes an introduction to networks, backups, history of the field, career information, and a glossary of key terms including US government acronyms. Emphasizing the key components of information security, key topics include physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, and sandboxing.Features:• Examples to help the reader learn to identify suspect activity• Promotes an approach that emphasizes preparation and prevention while describing the tools and techniques in detection of problems and steps for recoverySelected Topics:Physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operatio

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cybersecurity: An Introduction


Cybersecurity: An Introduction

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!