Book description
This volume provides a clear understanding of the concepts behind cyber-prevalent threats, tactics, and procedures. The team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. They address more than 75 key security concepts in a series of well-illustrated summaries designed for most levels of technical understanding. Accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff.
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- A Note from the Executive Editors
- About the Authors
- Contributors
- Chapter 1. Cyber Security Fundamentals (1/15)
- Chapter 1. Cyber Security Fundamentals (2/15)
- Chapter 1. Cyber Security Fundamentals (3/15)
- Chapter 1. Cyber Security Fundamentals (4/15)
- Chapter 1. Cyber Security Fundamentals (5/15)
- Chapter 1. Cyber Security Fundamentals (6/15)
- Chapter 1. Cyber Security Fundamentals (7/15)
- Chapter 1. Cyber Security Fundamentals (8/15)
- Chapter 1. Cyber Security Fundamentals (9/15)
- Chapter 1. Cyber Security Fundamentals (10/15)
- Chapter 1. Cyber Security Fundamentals (11/15)
- Chapter 1. Cyber Security Fundamentals (12/15)
- Chapter 1. Cyber Security Fundamentals (13/15)
- Chapter 1. Cyber Security Fundamentals (14/15)
- Chapter 1. Cyber Security Fundamentals (15/15)
- Chapter 2. Attacker Techniques and Motivations (1/9)
- Chapter 2. Attacker Techniques and Motivations (2/9)
- Chapter 2. Attacker Techniques and Motivations (3/9)
- Chapter 2. Attacker Techniques and Motivations (4/9)
- Chapter 2. Attacker Techniques and Motivations (5/9)
- Chapter 2. Attacker Techniques and Motivations (6/9)
- Chapter 2. Attacker Techniques and Motivations (7/9)
- Chapter 2. Attacker Techniques and Motivations (8/9)
- Chapter 2. Attacker Techniques and Motivations (9/9)
- Chapter 3. Exploitation (1/16)
- Chapter 3. Exploitation (2/16)
- Chapter 3. Exploitation (3/16)
- Chapter 3. Exploitation (4/16)
- Chapter 3. Exploitation (5/16)
- Chapter 3. Exploitation (6/16)
- Chapter 3. Exploitation (7/16)
- Chapter 3. Exploitation (8/16)
- Chapter 3. Exploitation (9/16)
- Chapter 3. Exploitation (10/16)
- Chapter 3. Exploitation (11/16)
- Chapter 3. Exploitation (12/16)
- Chapter 3. Exploitation (13/16)
- Chapter 3. Exploitation (14/16)
- Chapter 3. Exploitation (15/16)
- Chapter 3. Exploitation (16/16)
- Chapter 4. Malicious Code (1/15)
- Chapter 4. Malicious Code (2/15)
- Chapter 4. Malicious Code (3/15)
- Chapter 4. Malicious Code (4/15)
- Chapter 4. Malicious Code (5/15)
- Chapter 4. Malicious Code (6/15)
- Chapter 4. Malicious Code (7/15)
- Chapter 4. Malicious Code (8/15)
- Chapter 4. Malicious Code (9/15)
- Chapter 4. Malicious Code (10/15)
- Chapter 4. Malicious Code (11/15)
- Chapter 4. Malicious Code (12/15)
- Chapter 4. Malicious Code (13/15)
- Chapter 4. Malicious Code (14/15)
- Chapter 4. Malicious Code (15/15)
- Chapter 5. Defense and Analysis Techniques (1/8)
- Chapter 5. Defense and Analysis Techniques (2/8)
- Chapter 5. Defense and Analysis Techniques (3/8)
- Chapter 5. Defense and Analysis Techniques (4/8)
- Chapter 5. Defense and Analysis Techniques (5/8)
- Chapter 5. Defense and Analysis Techniques (6/8)
- Chapter 5. Defense and Analysis Techniques (7/8)
- Chapter 5. Defense and Analysis Techniques (8/8)
- Chapter 6. iDefense Special File Investigation Tools (1/2)
- Chapter 6. iDefense Special File Investigation Tools (2/2)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back Cover
Product information
- Title: Cyber Security Essentials
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439851265
You might also like
book
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Introduction to Computer Networks and Cybersecurity
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity …