Cyber Security Essentials

Book description

This volume provides a clear understanding of the concepts behind cyber-prevalent threats, tactics, and procedures. The team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. They address more than 75 key security concepts in a series of well-illustrated summaries designed for most levels of technical understanding. Accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff.

Table of contents

  1. Front Cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. A Note from the Executive Editors
  5. About the Authors
  6. Contributors
  7. Chapter 1. Cyber Security Fundamentals (1/15)
  8. Chapter 1. Cyber Security Fundamentals (2/15)
  9. Chapter 1. Cyber Security Fundamentals (3/15)
  10. Chapter 1. Cyber Security Fundamentals (4/15)
  11. Chapter 1. Cyber Security Fundamentals (5/15)
  12. Chapter 1. Cyber Security Fundamentals (6/15)
  13. Chapter 1. Cyber Security Fundamentals (7/15)
  14. Chapter 1. Cyber Security Fundamentals (8/15)
  15. Chapter 1. Cyber Security Fundamentals (9/15)
  16. Chapter 1. Cyber Security Fundamentals (10/15)
  17. Chapter 1. Cyber Security Fundamentals (11/15)
  18. Chapter 1. Cyber Security Fundamentals (12/15)
  19. Chapter 1. Cyber Security Fundamentals (13/15)
  20. Chapter 1. Cyber Security Fundamentals (14/15)
  21. Chapter 1. Cyber Security Fundamentals (15/15)
  22. Chapter 2. Attacker Techniques and Motivations (1/9)
  23. Chapter 2. Attacker Techniques and Motivations (2/9)
  24. Chapter 2. Attacker Techniques and Motivations (3/9)
  25. Chapter 2. Attacker Techniques and Motivations (4/9)
  26. Chapter 2. Attacker Techniques and Motivations (5/9)
  27. Chapter 2. Attacker Techniques and Motivations (6/9)
  28. Chapter 2. Attacker Techniques and Motivations (7/9)
  29. Chapter 2. Attacker Techniques and Motivations (8/9)
  30. Chapter 2. Attacker Techniques and Motivations (9/9)
  31. Chapter 3. Exploitation (1/16)
  32. Chapter 3. Exploitation (2/16)
  33. Chapter 3. Exploitation (3/16)
  34. Chapter 3. Exploitation (4/16)
  35. Chapter 3. Exploitation (5/16)
  36. Chapter 3. Exploitation (6/16)
  37. Chapter 3. Exploitation (7/16)
  38. Chapter 3. Exploitation (8/16)
  39. Chapter 3. Exploitation (9/16)
  40. Chapter 3. Exploitation (10/16)
  41. Chapter 3. Exploitation (11/16)
  42. Chapter 3. Exploitation (12/16)
  43. Chapter 3. Exploitation (13/16)
  44. Chapter 3. Exploitation (14/16)
  45. Chapter 3. Exploitation (15/16)
  46. Chapter 3. Exploitation (16/16)
  47. Chapter 4. Malicious Code (1/15)
  48. Chapter 4. Malicious Code (2/15)
  49. Chapter 4. Malicious Code (3/15)
  50. Chapter 4. Malicious Code (4/15)
  51. Chapter 4. Malicious Code (5/15)
  52. Chapter 4. Malicious Code (6/15)
  53. Chapter 4. Malicious Code (7/15)
  54. Chapter 4. Malicious Code (8/15)
  55. Chapter 4. Malicious Code (9/15)
  56. Chapter 4. Malicious Code (10/15)
  57. Chapter 4. Malicious Code (11/15)
  58. Chapter 4. Malicious Code (12/15)
  59. Chapter 4. Malicious Code (13/15)
  60. Chapter 4. Malicious Code (14/15)
  61. Chapter 4. Malicious Code (15/15)
  62. Chapter 5. Defense and Analysis Techniques (1/8)
  63. Chapter 5. Defense and Analysis Techniques (2/8)
  64. Chapter 5. Defense and Analysis Techniques (3/8)
  65. Chapter 5. Defense and Analysis Techniques (4/8)
  66. Chapter 5. Defense and Analysis Techniques (5/8)
  67. Chapter 5. Defense and Analysis Techniques (6/8)
  68. Chapter 5. Defense and Analysis Techniques (7/8)
  69. Chapter 5. Defense and Analysis Techniques (8/8)
  70. Chapter 6. iDefense Special File Investigation Tools (1/2)
  71. Chapter 6. iDefense Special File Investigation Tools (2/2)
  72. Index (1/3)
  73. Index (2/3)
  74. Index (3/3)
  75. Back Cover

Product information

  • Title: Cyber Security Essentials
  • Author(s): James Graham, Ryan Olson, Rick Howard
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439851265