Cargando…

Cybersecurity Fundamentals A Real-World Perspective.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Thakur, Kutub
Otros Autores: Pathan, Al-Sakib Khan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Milton : Taylor & Francis Group, 2020.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Dedication
  • Table of Contents
  • Preface
  • About the Authors
  • 1 Computers and Networks
  • 1.1 Introduction to Computers
  • 1.2 History of Computers
  • 1.2.1 First Generation (1937-1946)
  • 1.2.2 Second Generation (1947-1962)
  • 1.2.3 Third Generation (1963-1971)
  • 1.2.4 Fourth Generation (1971-2010)
  • 1.2.5 Fifth Generation (2010-Present)
  • 1.3 Components of Modern Computer
  • 1.3.1 Input Devices
  • 1.3.2 Output Devices
  • 1.3.3 Central Processing Unit (CPU)
  • 1.3.4 Storage Components
  • 1.3.5 Software Components
  • 1.4 Future Machines
  • 1.4.1 Artificial Intelligence
  • 1.4.2 Quantum Computing
  • 1.4.3 Nanotechnology
  • 1.4.4 Parallel Processing
  • 1.5 Introduction to Computer Networks
  • 1.5.1 Network Topologies
  • 1.5.2 Major Network Protocols
  • 1.5.3 Elements of Computer Network
  • 1.5.4 Types of Networks
  • 1.6 The Internet Explored
  • 1.6.1 History and Evolution of Internet
  • 1.7 Internet in Today's World
  • 1.7.1 Telecommunication
  • 1.7.2 Retail Sales
  • 1.7.3 Education
  • 1.7.4 Business Processes
  • 1.8 Elements of the Internet
  • 1.8.1 Internet Cloud
  • 1.8.2 Edge Router
  • 1.8.3 Core Router
  • 1.8.4 Firewalls
  • 1.8.5 Switches
  • 1.8.6 Hubs
  • 1.8.7 Servers
  • 1.8.8 Connectivity
  • 1.8.9 Hosts
  • 1.9 Internet Software Infrastructure & Protocols
  • 1.9.1 IP Address
  • 1.9.2 DNS Server
  • 1.9.3 TCP/IP Protocol
  • 1.9.4 HTTP
  • 1.9.5 World Wide Web (WWW)
  • Sample Questions and Answers for What We Have Learned in Chapter 1
  • Sources
  • 2 Cybersecurity Basics
  • 2.1 Introduction
  • 2.2 Importance of Cybersecurity
  • 2.3 Introduction to Cyberattacks
  • 2.4 Objectives of Cyberattacks
  • 2.4.1 Condfientiality Breach
  • 2.4.2 Availability Breach
  • 2.4.3 Integrity Breach
  • Sample Questions and Answers for What We Have Learned in Chapter 2
  • Sources
  • 3 Types of Cyberattacks
  • 3.1 Introduction
  • 3.2 Denial of Service (DoS)
  • 3.3 Distributed Denial of Service (DDoS)
  • 3.4 Man-in-the-Middle (MITM) Attacks
  • 3.5 Cryptojacking
  • 3.6 SQL Injection
  • 3.7 Spamming
  • 3.8 Cyberterrorism
  • 3.9 Digital Property Misappropriation
  • 3.10 Zero-Day Exploitation
  • 3.11 Phishing
  • 3.12 Digital Vandalism
  • 3.13 Cyberstalking
  • 3.14 Cyber Frauds and Forgery
  • Sample Questions and Answers for What We Have Learned in Chapter 3
  • Sources
  • 4 Recent Cyberattacks and Their Impact
  • 4.1 Introduction
  • 4.2 Equifax Data Theft
  • 4.3 VPNFilter Cyberattack
  • 4.4 WannaCry Ransom Attack
  • 4.5 Peta Cyberattack
  • 4.6 US Election Manipulation
  • 4.7 Power Grid Hacking
  • 4.8 Shadow Network Attack
  • 4.9 GitHub DDoS Attack 2018
  • 4.10 Under Armor Account Hacking
  • Sample Questions and Answers for What We Have Learned in Chapter 4
  • Sources
  • 5 Types of Computer Malware
  • 5.1 Introduction
  • 5.2 Viruses
  • 5.3 Trojan Horse
  • 5.4 Rootkit
  • 5.5 Spyware
  • 5.6 Worms
  • 5.7 Adware
  • 5.8 Scareware
  • 5.9 Browser Hijacker