001484774 000__ 04720cam\\22005177a\4500 001484774 001__ 1484774 001484774 003__ OCoLC 001484774 005__ 20240117003336.0 001484774 006__ m\\\\\o\\d\\\\\\\\ 001484774 007__ cr\cn\nnnunnun 001484774 008__ 231216s2023\\\\nyu\\\\\ob\\\\001\0\eng\d 001484774 019__ $$a1413735281$$a1413735816 001484774 020__ $$a9781484295601$$q(electronic bk.) 001484774 020__ $$a1484295609$$q(electronic bk.) 001484774 020__ $$z9781484295595 001484774 020__ $$z1484295595 001484774 0247_ $$a10.1007/978-1-4842-9560-1$$2doi 001484774 035__ $$aSP(OCoLC)1414457067 001484774 040__ $$aEBLCP$$beng$$cEBLCP$$dORMDA$$dGW5XE$$dOCLCO$$dOCLKB$$dYDX 001484774 049__ $$aISEA 001484774 050_4 $$aQA76.9.A25 001484774 08204 $$a005.8$$223/eng/20231219 001484774 1001_ $$aNielson, Seth James,$$eauthor. 001484774 24510 $$aDiscovering cybersecurity$$h[electronic resource] :$$bA Technical Introduction for the Absolute Beginner /$$cSeth James Nielson. 001484774 260__ $$aNew York, NY :$$bApress L. P.,$$c[2023] 001484774 300__ $$a1 online resource (447 p.) 001484774 336__ $$atext$$btxt$$2rdacontent 001484774 337__ $$acomputer$$bc$$2rdamedia 001484774 338__ $$aonline resource$$bcr$$2rdacarrier 001484774 500__ $$aDescription based upon print version of record. 001484774 504__ $$aIncludes bibliographical references and index. 001484774 5050_ $$aChapter 1: The Psychology of Cybersecurity -- Chapter 2: Authentication Technology -- Chapter 3: Authorization Technology -- Chapter 4: Cryptography Foundations -- Chapter 5: Core Cryptography Technology -- Chapter 6: Cryptographic Systems Technology -- Chapter 7: Host Security Technology -- Chapter 8: Classical Network Security Technology -- Chapter 9: World Wide Web Security -- Chapter 10: Overlay Security: Email and Social Media -- Appendix A: Binary and Hexadecimal Numbers -- Appendix B: Computers, Data, and Programs -- Appendix C: Computer Communications and Networking. 001484774 506__ $$aAccess limited to authorized users. 001484774 520__ $$aThe contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission. This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers "crack" password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is For Professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology. 001484774 650_0 $$aComputer security. 001484774 650_6 $$aSécurité informatique. 001484774 655_0 $$aElectronic books. 001484774 77608 $$iPrint version:$$aNielson, Seth James$$tDiscovering Cybersecurity$$dBerkeley, CA : Apress L. P.,c2024$$z9781484295595 001484774 852__ $$bebk 001484774 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-9560-1$$zOnline Access$$91397441.1 001484774 909CO $$ooai:library.usi.edu:1484774$$pGLOBAL_SET 001484774 980__ $$aBIB 001484774 980__ $$aEBOOK 001484774 982__ $$aEbook 001484774 983__ $$aOnline 001484774 994__ $$a92$$bISE