Lingua: Inglese
Editore: Apress (edition First Edition), 2023
ISBN 10: 1484295595 ISBN 13: 9781484295595
Da: BooksRun, Philadelphia, PA, U.S.A.
Prima edizione
Paperback. Condizione: Very Good. First Edition. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting.
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 33,76
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Lakeside Books, Benton Harbor, MI, U.S.A.
EUR 32,59
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner. Book.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 37,66
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: California Books, Miami, FL, U.S.A.
EUR 40,10
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 46,56
Quantità: 5 disponibili
Aggiungi al carrelloCondizione: new.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Prima edizione
Paperback. Condizione: new. Paperback. The contemporary IT landscape is littered with various technologies that vendors claim will solve an organizations cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organizations mission.This book introduces major technologies that are employed in todays cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.What You Will LearnAuthentication technologies, including secure password storage and how hackers crack password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threatsWho This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. Beginning-Intermediate user level Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 50,31
Quantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 45,00
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 46,85
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Revaluation Books, Exeter, Regno Unito
EUR 55,46
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 457 pages. 9.25x6.10x0.93 inches. In Stock.
EUR 41,82
Quantità: 5 disponibili
Aggiungi al carrelloCondizione: new.
Condizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 63,82
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: UK BOOKS STORE, London, LONDO, Regno Unito
EUR 103,16
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. Brand New! Fast Delivery "International Edition " and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 4-6 Working days .and we do have flat rate for up to 2LB. Extra shipping charges will be requested This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability.
Da: AussieBookSeller, Truganina, VIC, Australia
Prima edizione
EUR 85,45
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. The contemporary IT landscape is littered with various technologies that vendors claim will solve an organizations cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organizations mission.This book introduces major technologies that are employed in todays cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.What You Will LearnAuthentication technologies, including secure password storage and how hackers crack password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threatsWho This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. Beginning-Intermediate user level Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
EUR 58,84
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 460 pp. Englisch.
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 58,84
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 460 pp. Englisch.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 59,97
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering.
Da: preigu, Osnabrück, Germania
EUR 50,25
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Discovering Cybersecurity | A Technical Introduction for the Absolute Beginner | Seth James Nielson | Taschenbuch | xiv | Englisch | 2023 | Apress | EAN 9781484295595 | Verantwortliche Person für die EU: APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu Print on Demand.
Editore: Apress, 2023
ISBN 10: 1484295595 ISBN 13: 9781484295595
Da: moluna, Greven, Germania
EUR 48,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Beginning-Intermediate user level|Helps you cut through the marketing from cybersecurity vendors to know what your organization really needsCovers the capabilities and limitations that a cybersecurity tech gives to your security teamShows y.