Cargando…

Cybersecurity Fundamentals A Real-World Perspective.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Thakur, Kutub
Otros Autores: Pathan, Al-Sakib Khan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Milton : Taylor & Francis Group, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1153088598
003 OCoLC
005 20240329122006.0
006 m d
007 cr |||||||||||
008 200509s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d REDDC  |d OCLCO  |d OCLCL 
020 |a 9781000059632 
020 |a 1000059634 
035 |a (OCoLC)1153088598 
050 4 |a TK5105.59  |b .T497 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Thakur, Kutub. 
245 1 0 |a Cybersecurity Fundamentals  |h [electronic resource] :  |b A Real-World Perspective. 
260 |a Milton :  |b Taylor & Francis Group,  |c 2020. 
300 |a 1 online resource (305 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- About the Authors -- 1 Computers and Networks -- 1.1 Introduction to Computers -- 1.2 History of Computers -- 1.2.1 First Generation (1937-1946) -- 1.2.2 Second Generation (1947-1962) -- 1.2.3 Third Generation (1963-1971) -- 1.2.4 Fourth Generation (1971-2010) -- 1.2.5 Fifth Generation (2010-Present) -- 1.3 Components of Modern Computer -- 1.3.1 Input Devices -- 1.3.2 Output Devices -- 1.3.3 Central Processing Unit (CPU) -- 1.3.4 Storage Components -- 1.3.5 Software Components 
505 8 |a 1.4 Future Machines -- 1.4.1 Artificial Intelligence -- 1.4.2 Quantum Computing -- 1.4.3 Nanotechnology -- 1.4.4 Parallel Processing -- 1.5 Introduction to Computer Networks -- 1.5.1 Network Topologies -- 1.5.2 Major Network Protocols -- 1.5.3 Elements of Computer Network -- 1.5.4 Types of Networks -- 1.6 The Internet Explored -- 1.6.1 History and Evolution of Internet -- 1.7 Internet in Today's World -- 1.7.1 Telecommunication -- 1.7.2 Retail Sales -- 1.7.3 Education -- 1.7.4 Business Processes -- 1.8 Elements of the Internet -- 1.8.1 Internet Cloud -- 1.8.2 Edge Router -- 1.8.3 Core Router 
505 8 |a 1.8.4 Firewalls -- 1.8.5 Switches -- 1.8.6 Hubs -- 1.8.7 Servers -- 1.8.8 Connectivity -- 1.8.9 Hosts -- 1.9 Internet Software Infrastructure & Protocols -- 1.9.1 IP Address -- 1.9.2 DNS Server -- 1.9.3 TCP/IP Protocol -- 1.9.4 HTTP -- 1.9.5 World Wide Web (WWW) -- Sample Questions and Answers for What We Have Learned in Chapter 1 -- Sources -- 2 Cybersecurity Basics -- 2.1 Introduction -- 2.2 Importance of Cybersecurity -- 2.3 Introduction to Cyberattacks -- 2.4 Objectives of Cyberattacks -- 2.4.1 Condfientiality Breach -- 2.4.2 Availability Breach -- 2.4.3 Integrity Breach 
505 8 |a Sample Questions and Answers for What We Have Learned in Chapter 2 -- Sources -- 3 Types of Cyberattacks -- 3.1 Introduction -- 3.2 Denial of Service (DoS) -- 3.3 Distributed Denial of Service (DDoS) -- 3.4 Man-in-the-Middle (MITM) Attacks -- 3.5 Cryptojacking -- 3.6 SQL Injection -- 3.7 Spamming -- 3.8 Cyberterrorism -- 3.9 Digital Property Misappropriation -- 3.10 Zero-Day Exploitation -- 3.11 Phishing -- 3.12 Digital Vandalism -- 3.13 Cyberstalking -- 3.14 Cyber Frauds and Forgery -- Sample Questions and Answers for What We Have Learned in Chapter 3 -- Sources 
505 8 |a 4 Recent Cyberattacks and Their Impact -- 4.1 Introduction -- 4.2 Equifax Data Theft -- 4.3 VPNFilter Cyberattack -- 4.4 WannaCry Ransom Attack -- 4.5 Peta Cyberattack -- 4.6 US Election Manipulation -- 4.7 Power Grid Hacking -- 4.8 Shadow Network Attack -- 4.9 GitHub DDoS Attack 2018 -- 4.10 Under Armor Account Hacking -- Sample Questions and Answers for What We Have Learned in Chapter 4 -- Sources -- 5 Types of Computer Malware -- 5.1 Introduction -- 5.2 Viruses -- 5.3 Trojan Horse -- 5.4 Rootkit -- 5.5 Spyware -- 5.6 Worms -- 5.7 Adware -- 5.8 Scareware -- 5.9 Browser Hijacker 
500 |a Sample Questions and Answers for What We Have Learned in Chapter 5 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
700 1 |a Pathan, Al-Sakib Khan. 
758 |i has work:  |a Cybersecurity fundamentals (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGCrCGPth67tMKM6qBfGtq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Thakur, Kutub  |t Cybersecurity Fundamentals : A Real-World Perspective  |d Milton : Taylor & Francis Group,c2020  |z 9780367476489 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6186711  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6186711 
994 |a 92  |b IZTAP