Invitation to Cybersecurity: Cybersecurity for Beginners Easy to Read and Comprehensive Introduction to Cybersecurity Cybersecurity from the Ground Up

Invitation to Cybersecurity: Cybersecurity for Beginners Easy to Read and Comprehensive Introduction to Cybersecurity Cybersecurity from the Ground Up
Details Invitation to Cybersecurity begins with an overview of cyberspace and how computers and the Internet work from 1s and 0s to software, hardware, operating systems, and web browsers. Next the need for cybersecurity is covered by introducing hackers, hacking culture, and the different ways that hackers attack computer systems to gain unauthorized access. This leads to the goals of cybersecurity and the CIA triad: confidentiality, integrity, and availability. Then the text goes into cybersecurity risk management as the high-level approach to allocating scarce resources in order to get the biggest bang for the buck. Next adversarial thinking is introduced as the hallmark of cybersecurity, and game theory basics are covered to sharpen the reader's ability to anticipate the strategic actions of hackers. The text then provides an overview of classical cryptography and how cryptography works in computer systems, including symmetric and public key crypto and hashing. Next access control is addressed with an overview of AAA: authentication, authorization, and accounting. The principles of cybersecurity and best practices are then covered before finally addressing the legal and ethical aspects of cybersecurity.
Target Audience This text is for students in introductory cyber courses and anybody who wants to understand cybersecurity and learn the basics of the field. It will help readers better protect themselves online by showing them how cyberspace works, how hackers think, and how cybersecurity is achieved. In what is often considered an intimidating and complex field, the author's engaging style and clear writing makes for an easy but deeply educational read.
Table of Contents Ch 1: Introduction: The Hacker Advantage Ch 2: The Context o
PRP: 193.67 Lei

Acesta este Pretul Recomandat de Producator. Pretul de vanzare al produsului este afisat mai jos.
174.30Lei
174.30Lei
193.67 LeiLivrare in 2-4 saptamani
Descrierea produsului
Details Invitation to Cybersecurity begins with an overview of cyberspace and how computers and the Internet work from 1s and 0s to software, hardware, operating systems, and web browsers. Next the need for cybersecurity is covered by introducing hackers, hacking culture, and the different ways that hackers attack computer systems to gain unauthorized access. This leads to the goals of cybersecurity and the CIA triad: confidentiality, integrity, and availability. Then the text goes into cybersecurity risk management as the high-level approach to allocating scarce resources in order to get the biggest bang for the buck. Next adversarial thinking is introduced as the hallmark of cybersecurity, and game theory basics are covered to sharpen the reader's ability to anticipate the strategic actions of hackers. The text then provides an overview of classical cryptography and how cryptography works in computer systems, including symmetric and public key crypto and hashing. Next access control is addressed with an overview of AAA: authentication, authorization, and accounting. The principles of cybersecurity and best practices are then covered before finally addressing the legal and ethical aspects of cybersecurity.
Target Audience This text is for students in introductory cyber courses and anybody who wants to understand cybersecurity and learn the basics of the field. It will help readers better protect themselves online by showing them how cyberspace works, how hackers think, and how cybersecurity is achieved. In what is often considered an intimidating and complex field, the author's engaging style and clear writing makes for an easy but deeply educational read.
Table of Contents Ch 1: Introduction: The Hacker Advantage Ch 2: The Context o
Detaliile produsului