Normal view MARC view ISBD view
Tipo: materialTypeLabelLibro - General
Ubicación Física: 005.8 / 052

Cyber security essentials /

Autor: Olson, Ryan.
Otros Autores: Ligh, Michael ( autor ) ; Sinclair, Greg ( autor ) ; Hartstein, Blake ( autor ) ; Sudusinghe, Shahan ( autor ) ; Gary, Jon ( autor ) ; Falcone, Robert ( autor ) ; Mata, Aldrich da ( autor ) ; Smith, Ryan ( autor ) ; Lawrence, Arion ( autor ) .
Pié de imprenta: Boca Raton : CRC Press : Taylor & Francis Group, 2011.
Descripción: 325 páginas, ilustraciones ; 16 x 23 cm.
ISBN: 8781439851234.
Tema(s):
Nota de Bibliografía: Incluye bibliografía.
Contenido: Chapter 1. Cyber security fundamentals. Chapter 2. Attacker techniques and motivations. Chapter 3. Exploitation. Chapter 4. Malicious code. Chapter 5. Defense and analysis techniques. Chapter 6. iDefense special file investigation tools.
Resumen: The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: • Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors • Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding • Supplies actionable advice for the mitigation of threats • Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

List(s) this item appears in: Adquisiciones Sistemas 2017-
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Date due Barcode
Libro - General Libro - General Biblioteca UCATOLICA
Carrera 13
Colección General 005.8 / 052 (Browse shelf) Ej. 1 Available (Acceso Libre) 59489
Libro - General Libro - General Biblioteca UCATOLICA
Carrera 13
Colección General 005.8 / 052 (Browse shelf) Ej. 2 Available (Acceso Libre) 59490

Incluye bibliografía

Chapter 1. Cyber security fundamentals. Chapter 2. Attacker techniques and motivations. Chapter 3. Exploitation. Chapter 4. Malicious code. Chapter 5. Defense and analysis techniques. Chapter 6. iDefense special file investigation tools.

Sistemas

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.

To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book:

• Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors
• Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding
• Supplies actionable advice for the mitigation of threats
• Breaks down the code used to write exploits into understandable diagrams

This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

There are no comments for this item.

Log in to your account to post a comment.

Click on an image to view it in the image viewer

Universidad Católica de Colombia
La Universidad Católica de Colombia es una Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación, reconocida mediante Resolución Número 2271 de julio 7 de 1970 del Ministerio de Justicia.
Universidad Católica de Colombia © Copyright 2017
Universidad Católica de Colombia • PBX: (57 1) 3 27 73 00 - (57 1) 3 27 73 33
Bogotá, Avenida Caracas # 46 -72, sede Las Torres • Bogotá, Carrera 13 # 47 – 30, Sede 4​ • Bogotá, Diagonal 46 A # 15 B – 10, sede El Claustro
Bogotá, Carrera 13 # 47 – 49, sede Carrera 13