Cyberspace and Cybersecurity

Cyberspace and Cybersecurity

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • نویسنده : George Kostopoulos
  • چاپ و سال / کشور: 2012
  • تعداد صفحه : 236
  • شابک / ISBN : 1466501332

Description

English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Examines the risks inherent in information system components, namely hardware, software, and peopleExplains why asset identification should be the cornerstone of any information security strategyIdentifies the traits a CIO must have to address cybersecurity challengesDescribes how to ensure business continuity in the event of adverse incidents, including acts of natureConsiders intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deploymentExplaining how to secure a computer against malware and cyber attacks, the text’s wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our country’s cyber preparedness.
Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
d courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Examines the risks inherent in information system components, namely hardware, software, and peopleExplains why asset identification should be the cornerstone of any information security strategyIdentifies the traits a CIO must have to address cybersecurity challengesDescribes how to ensure business continuity in the event of adverse incidents, including acts of natureConsiders intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deploymentExplaining how to secure a computer against malware and cyber attacks, the text’s wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our country’s cyber preparedness.
Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری