001452769 000__ 03292cam\a2200517\a\4500 001452769 001__ 1452769 001452769 003__ OCoLC 001452769 005__ 20230314003317.0 001452769 006__ m\\\\\o\\d\\\\\\\\ 001452769 007__ cr\un\nnnunnun 001452769 008__ 220709s2023\\\\si\\\\\\ob\\\\000\0\eng\d 001452769 019__ $$a1334101156$$a1336405248 001452769 020__ $$a9789811926587$$q(electronic bk.) 001452769 020__ $$a9811926581$$q(electronic bk.) 001452769 020__ $$z9789811926570 001452769 020__ $$z9811926573 001452769 0247_ $$a10.1007/978-981-19-2658-7$$2doi 001452769 035__ $$aSP(OCoLC)1334105607 001452769 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCQ 001452769 049__ $$aISEA 001452769 050_4 $$aQA76.9.A25 001452769 08204 $$a005.8$$223/eng/20220715 001452769 1001_ $$aRawal, Bharat S. 001452769 24510 $$aCybersecurity and identity access management /$$cBharat S. Rawal, Gunasekaran Manogaran, Alexender Peter. 001452769 260__ $$aSingapore :$$bSpringer,$$c[2023] 001452769 300__ $$a1 online resource (240 pages) 001452769 336__ $$atext$$btxt$$2rdacontent 001452769 337__ $$acomputer$$bc$$2rdamedia 001452769 338__ $$aonline resource$$bcr$$2rdacarrier 001452769 504__ $$aIncludes bibliographical references. 001452769 5050_ $$aCybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls. 001452769 506__ $$aAccess limited to authorized users. 001452769 520__ $$aThis textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. 001452769 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 15, 2022). 001452769 650_0 $$aComputer security. 001452769 650_0 $$aComputer networks$$xAccess control. 001452769 655_0 $$aElectronic books. 001452769 7001_ $$aManogaran, Gunasekaran,$$d1989- 001452769 7001_ $$aPeter, Alexender. 001452769 77608 $$iPrint version:$$aRawal, Bharat S.$$tCybersecurity and Identity Access Management.$$dSingapore : Springer, ©2022$$z9789811926570 001452769 852__ $$bebk 001452769 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-2658-7$$zOnline Access$$91397441.1 001452769 909CO $$ooai:library.usi.edu:1452769$$pGLOBAL_SET 001452769 980__ $$aBIB 001452769 980__ $$aEBOOK 001452769 982__ $$aEbook 001452769 983__ $$aOnline 001452769 994__ $$a92$$bISE