본문

서브메뉴

상세정보

Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.
Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getti...
Cybersecurity: the beginner's guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.

상세정보

자료유형  
 전자책(국외)
미국국회도서관 청구기호  
QA76.9.A25
기본표목-개인명  
표제와 책임표시사항  
Cybersecurity: the beginners guide [electronic resource] : A Comprehensive Guide to Getting Started in Cybersecurity.
발행, 배포, 간사 사항  
Birmingham : Packt Publishing, Limited , 2019.
    형태사항  
    1 online resource (384 p.)
    일반주기  
    Description based upon print version of record.
    일반주기  
    Social characteristics of hackers
    내용주기  
    완전내용Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems
    내용주기  
    완전내용Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale
    내용주기  
    완전내용Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned ?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts
    내용주기  
    완전내용Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration
    내용주기  
    완전내용System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant
    요약 등 주기  
    요약Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    주제명부출표목-일반주제명  
    기타형태저록  
    Print version Ozkaya Erdal Cybersecurity: the Beginner's Guide
    전자적 위치 및 접속  
      링크정보보기

    MARC

     008210114s2019        ulk                      00        kor
    ■001on1103218694
    ■003OCoLC
    ■00520190620054142.4
    ■006m                d                
    ■007cr  cnu---unuuu
    ■020    ▼a1789806933
    ■020    ▼a9781789806939▼q(electronic  bk.)
    ■035    ▼a2145643▼b(N$T)
    ■035    ▼a(OCoLC)1103218694
    ■040    ▼aEBLCP▼beng▼cEBLCP▼dN$T
    ■049    ▼aMAIN
    ■050  4▼aQA76.9.A25
    ■072  7▼aCOM▼x032000▼2bisacsh
    ■072  7▼aCOM▼x046000▼2bisacsh
    ■08204▼a005.8▼223
    ■1001  ▼aOzkaya,  Erdal.
    ■24510▼aCybersecurity:  the  beginner's  guide▼h[electronic  resource]  :▼bA  Comprehensive  Guide  to  Getting  Started  in  Cybersecurity.
    ■260    ▼aBirmingham▼bPackt  Publishing,  Limited▼c2019.
    ■300    ▼a1  online  resource  (384  p.)
    ■500    ▼aDescription  based  upon  print  version  of  record.
    ■500    ▼aSocial  characteristics  of  hackers
    ■5050  ▼aCover;  Title  Page;  Copyright  and  Credits;  Acknowledment;  About  Packt;  Contributors;  Table  of  Contents;  Preface;  Chapter  1:  Importance  of  Cybersecurity;  The  history  of  data  breaches;  Scenarios  for  security;  Understanding  the  attack  surface;  The  threat  landscape;  The  importance  of  securing  the  network  and  applications;  The  history  of  breaches;  1984  --  The  TRW  data  breach;  1990s  --  Beginning  of  computer  viruses  and  worms;  The  years  2000-2010;  How  security  helps  to  build  trust;  Summary;  Chapter  2:  Security  Evolution  --  From  Legacy  to  Advanced,  to  ML  and  AI;  Legacy  cybersecurity  systems
    ■5058  ▼aSignature-based  security  systemsNetwork  cyber  attacks;  Network  security  tools;  Transformations  in  cybersecurity;  Layered  security;  New  security  threats;  Responses  to  the  new  threats;  Advancements  in  security  technology  to  security  2.0;  Anomaly-based  security  systems;  How  ML  and  AI  will  play  a  larger  role  in  cybersecurity;  Summary;  Further  reading;  Chapter  3:  Learning  Cybersecurity  Technologies;  Mobile  security;  Loss  or  theft;  Software-related  security  issues;  Advanced  data  security;  Cloud  security;  Modern  day  regulations;  Incidence  response  and  forensics;  Enterprise  security  at  scale
    ■5058  ▼aPenetration  testingTruSec  training;  CQURE  Academy;  Training  with  Troy  Hunt;  Have  I  Been  Pwned  ?;  DevSecOps;  IoT  security;  User  behavior  analytics  (UBA);  Endpoint  detection  and  response  (EDR);  Summary;  Further  reading;  Chapter  4:  Skills  We  Need  for  a  Cybersecurity  Career;  General  cybersecurity  roles;  Penetration  testers  and  vulnerability  testers;  Cybersecurity  consultants;  Cybersecurity  managers;  Cybersecurity  analysts;  Cybersecurity  engineers;  Chief  Information  Security  Officers  (CISOs);  Chief  Security  Officers  (CSOs);  Computer  system  administrators;  Cryptographers;  Computer  forensic  experts
    ■5058  ▼aNetwork  security  engineersInformation  assurance  technicians;  Data  security  analysts;  IT  security  compliance  analysts;  System  security  specialists;  Skills  to  acquire  in  cybersecurity;  Foundation  skills;  Risk  management;  Networking;  Situational  awareness;  Toolkits;  Security  analyst  skills;  Threat  assessment;  Vulnerability  assessment;  Log  collection  and  analysis;  Active  analysis;  Incidence  response;  Disaster  recovery;  Forensics;  Penetration  testing  skills;  Intelligence  gathering;  Incidence  reporting;  Restraint;  Security  architecture  skills;  Identity  and  access  management;  Network  configuration
    ■5058  ▼aSystem  hardeningChoosing  skills  to  pick  up  based  on  current  professional  experience  and  skills;  Ethical  hacking  skills;  Application  security  skills;  Cloud  security  skills;  DevSecOps  skills;  Threat  and  vulnerability  assessment  skills;  Information  security  management  skills;  Cybersecurity  litigation  support  skills;  Regulatory  compliance  and  auditing  skills;  Summary;  Further  reading;  Chapter  5:  Attacker  Mindset;  The  category  of  hackers;  The  traits  of  hackers;  They  are  patient;  They  are  determined;  They  are  insensitive;  They  are  risk-takers;  They  are  careful;  They  are  deviant
    ■520    ▼aCybersecurity  jobs  confines  from  basic  configuration  to  advanced  systems  analysis  and  defense  assessment.  Cybersecurity:  The  Beginner's  Guide  provides  thefundamental  information  you  need  to  understand  the  basics  of  the  field,  identify  your  place  within  it,  and  start  your  Cybersecurity  career.
    ■590    ▼aMaster  record  variable  field(s)  change:  050,  072,  082,  650
    ■650  0▼aComputer  security.
    ■650  7▼aCOMPUTERS  /  Information  Technology▼2bisacsh
    ■650  7▼aCOMPUTERS  /  Operating  Systems  /  General▼2bisacsh
    ■655  4▼aElectronic  books.
    ■77608▼iPrint  version▼aOzkaya,  Erdal▼tCybersecurity:  the  Beginner's  Guide▼dBirmingham  :  Packt  Publishing,  Limited,c2019▼z9781789616194
    ■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2145643
    ■938    ▼aEBL  -  Ebook  Library▼bEBLB▼nEBL5781046
    ■938    ▼aEBSCOhost▼bEBSC▼n2145643
    ■994    ▼a92▼bN$T

    미리보기

    내보내기

    chatGPT토론

    Ai 추천 관련 도서


      신착도서 더보기
      관련도서 더보기
      최근 3년간 통계입니다.
      SMS 발송 간략정보 이동 상세정보출력

      소장정보

      • 예약
      • 서가에 없는 책 신고
      • 자료배달서비스
      • 나의폴더
      • 우선정리요청
      소장자료
      등록번호 청구기호 소장처 대출가능여부 대출정보
      EM127928 EB  전자도서 자료대출실(3층) 온라인이용가능 온라인이용가능
      마이폴더

      * 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

      해당 도서를 다른 이용자가 함께 대출한 도서

      관련도서

      관련 인기도서

      서평쓰기

      도서위치

      AiBot !!
      CH