서브메뉴
검색
상세정보
Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.
Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.
상세정보
- 자료유형
- 전자책(국외)
- 미국국회도서관 청구기호
- QA76.9.A25
- 기본표목-개인명
- 표제와 책임표시사항
- Cybersecurity: the beginners guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.
- 발행, 배포, 간사 사항
- 형태사항
- 1 online resource (384 p.)
- 일반주기
- Description based upon print version of record.
- 일반주기
- Social characteristics of hackers
- 내용주기
- 완전내용Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems
- 내용주기
- 완전내용Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale
- 내용주기
- 완전내용Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned ?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts
- 내용주기
- 완전내용Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration
- 내용주기
- 완전내용System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant
- 요약 등 주기
- 요약Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 주제명부출표목-일반주제명
- 기타형태저록
- Print version Ozkaya Erdal Cybersecurity: the Beginner's Guide
- 전자적 위치 및 접속
- 링크정보보기
MARC
008210114s2019 ulk 00 kor■001on1103218694
■003OCoLC
■00520190620054142.4
■006m d
■007cr cnu---unuuu
■020 ▼a1789806933
■020 ▼a9781789806939▼q(electronic bk.)
■035 ▼a2145643▼b(N$T)
■035 ▼a(OCoLC)1103218694
■040 ▼aEBLCP▼beng▼cEBLCP▼dN$T
■049 ▼aMAIN
■050 4▼aQA76.9.A25
■072 7▼aCOM▼x032000▼2bisacsh
■072 7▼aCOM▼x046000▼2bisacsh
■08204▼a005.8▼223
■1001 ▼aOzkaya, Erdal.
■24510▼aCybersecurity: the beginner's guide▼h[electronic resource] :▼bA Comprehensive Guide to Getting Started in Cybersecurity.
■260 ▼aBirmingham▼bPackt Publishing, Limited▼c2019.
■300 ▼a1 online resource (384 p.)
■500 ▼aDescription based upon print version of record.
■500 ▼aSocial characteristics of hackers
■5050 ▼aCover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems
■5058 ▼aSignature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale
■5058 ▼aPenetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned ?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts
■5058 ▼aNetwork security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration
■5058 ▼aSystem hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant
■520 ▼aCybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
■590 ▼aMaster record variable field(s) change: 050, 072, 082, 650
■650 0▼aComputer security.
■650 7▼aCOMPUTERS / Information Technology▼2bisacsh
■650 7▼aCOMPUTERS / Operating Systems / General▼2bisacsh
■655 4▼aElectronic books.
■77608▼iPrint version▼aOzkaya, Erdal▼tCybersecurity: the Beginner's Guide▼dBirmingham : Packt Publishing, Limited,c2019▼z9781789616194
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2145643
■938 ▼aEBL - Ebook Library▼bEBLB▼nEBL5781046
■938 ▼aEBSCOhost▼bEBSC▼n2145643
■994 ▼a92▼bN$T
![Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getti...](/Sponge/Images/bookDefaults/EBbookdefaultsmall.png)


한글
ENG
日本
中文
Việt Nam