Muutke küpsiste eelistusi

E-raamat: Cybersecurity and Identity Access Management

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Jun-2022
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811926587
  • Formaat - EPUB+DRM
  • Hind: 86,44 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Jun-2022
  • Kirjastus: Springer Verlag, Singapore
  • Keel: eng
  • ISBN-13: 9789811926587

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.  


1 Cybersecurity for Beginners
1(20)
1.1 Introduction to Cybersecurity
1(1)
1.2 Necessity of Cybersecurity
2(1)
1.3 Cybersecurity Challenges
2(3)
1.4 Cybersecurity Threats
5(1)
1.5 Cyberattack Life Cycle
5(1)
1.6 Cybersecurity Principles
6(1)
1.7 Cybersecurity Standards
7(1)
1.8 Cybersecurity Framework
8(1)
1.9 Fundamentals of Cybersecurity
9(1)
1.10 Why is Cybersecurity Important?
9(2)
1.10.1 Confidentiality
10(1)
1.10.2 Integrity
11(1)
1.10.3 Availability
11(1)
1.11 Why Do We Implement Cybersecurity?
11(1)
1.12 Cybersecurity Attacks and Their Types
12(6)
1.12.1 Malware Attack
13(1)
1.12.2 Phishing Attacks
14(1)
1.12.3 Denial-of-Service Attacks
14(2)
1.12.4 SQL Injection Attacks
16(1)
1.12.5 Cross-Site Scripting
16(1)
1.12.6 Man-In-The-Middle Attacks
17(1)
1.13 Cybersecurity Development
18(1)
1.14 Advantages of Cyber Security
18(1)
1.15 Applications of Cybersecurity
19(2)
2 The Basics of Hacking and Penetration Testing
21(26)
2.1 Hacking Introduction
21(1)
2.2 Ethical Hacking
22(2)
2.3 Types of Cybercrime
24(3)
2.4 Denial-of-Service Attacks (DoS)
27(4)
2.5 Penetration Testing
31(16)
2.5.1 Penetration Testing Versus Vulnerability Assessment
34(1)
2.5.2 Types of Penetration Testing
34(2)
2.5.3 Penetration Testing---Manual and Automated
36(2)
2.5.4 Penetration Testing Tools
38(1)
2.5.5 Infrastructure Penetration Testing
38(3)
2.5.6 Penetration Testing---Tester
41(1)
2.5.7 Penetration Testing---Report Writing
42(2)
2.5.8 Penetration Testing---Ethical Hacking
44(1)
2.5.9 Penetration Testing Limitations
45(2)
3 Hacking for Dummies
47(16)
3.1 Security Hacker
47(1)
3.2 Classifications of Hacker
47(2)
3.3 Common Hacking Tools
49(1)
3.4 Common Hacking Techniques
49(5)
3.4.1 Ethical Hacking
51(3)
3.5 Developing Ethical Hacking Plan
54(1)
3.6 Types of Security Testing
54(3)
3.7 Ethical Hacking Tools
57(1)
3.8 Physical Security
58(1)
3.9 Risk Assessment
59(4)
4 Networking AH-In-One for Dummies
63(24)
4.1 Network Introduction
63(1)
4.2 Packet Network
63(1)
4.3 Topology of Network
64(5)
4.3.1 Types of Topologies
64(5)
4.4 Operating System for the Network
69(4)
4.5 Hardware Networking
73(1)
4.5.1 Range of the Network Hardware
73(1)
4.5.2 Computer Components of the Necessary Hardware
73(1)
4.6 Network Setup
74(2)
4.7 The Function of Prediction
76(1)
4.8 Network Security
77(1)
4.9 Defense Against Computers
78(1)
4.10 Sharing of the Network
78(3)
4.10.1 Operation of Network Sharing
79(2)
4.11 Goals and Competences
81(6)
4.11.1 Appearances of Problem-Solving
82(5)
5 Effective Cybersecurity
87(16)
5.1 Attacks and Vulnerabilities
87(1)
5.2 Community of Security of Information
87(1)
5.3 Cybersecurity Managed
88(2)
5.4 Network Security Governance Framework
90(1)
5.5 Risk Assessment of Structures
91(1)
5.6 Security Evaluation Aim
92(2)
5.6.1 Methodological Approach
92(1)
5.6.2 Checking for Protection
93(1)
5.6.3 Protection and Privacy
93(1)
5.7 Evaluation of Risk
94(1)
5.8 Study of the Cyber Danger
95(2)
5.9 Risk Evaluation Forms
97(1)
5.10 Safety for Software Development
98(1)
5.11 Strike Cyber
99(1)
5.12 Facts
99(4)
6 Mai ware
103(14)
6.1 What Does Malware Do?
103(1)
6.2 How to Protect Against Malware?
104(1)
6.3 Malware Analyzing Tools
105(7)
6.3.1 Basic Malware Exploring Tools
105(2)
6.3.2 Dynamic Malware Analyzing Tools
107(3)
6.3.3 Difference Between Static and Dynamic Malware Analysis Tools
110(1)
6.3.4 Warning Signs to Identify Malware Infection
111(1)
6.4 Most Dangerous Malware of 2018
112(5)
6.4.1 Malware Detection Techniques Used by Antivirus
112(2)
6.4.2 Tips to Prevents the System from Malware Actions
114(3)
7 Firewalls
117(12)
7.1 Importance of Firewalls
117(1)
7.2 Uses of Firewalls
118(1)
7.3 How Does Firewall Works
118(1)
7.4 Types of Firewall
119(5)
7.5 Benefits of Firewalls
124(1)
7.6 Advantages and Disadvantages of Firewalls
125(1)
7.7 Firewall Threats and Vulnerability
125(4)
8 Cryptography
129(12)
8.1 Evaluation of Cryptography
129(1)
8.2 Features of Cryptography
130(1)
8.3 Types of Cryptography
131(1)
8.4 Cryptography and Network Security Principles
132(1)
8.5 Cryptographic Algorithms
133(2)
8.6 Tools for Cryptography
135(2)
8.7 Advantages and Disadvantages of Cryptography
137(1)
8.8 Applications of Cryptography
138(3)
9 Control Physical and Logical Access to Assets
141(8)
9.1 Managing Access to Assets
141(1)
9.2 Why Access Control is Required: The CIA Triad
142(1)
9.3 Classification of Access Control
143(6)
9.3.1 Preventive Access Control
144(1)
9.3.2 Detective Access Control
144(1)
9.3.3 Corrective Access Control
144(1)
9.3.4 Deterrent Access Control
144(1)
9.3.5 Recovery Access Control
145(1)
9.3.6 Directive Access Control
145(1)
9.3.7 Compensation Access Control
145(1)
9.3.8 Administrative Access Controls
146(1)
9.3.9 Logical/Technical Controls
146(1)
9.3.10 Physical Access Controls
146(3)
10 Manage the Identification and Authentication of People, Devices, and Services
149(10)
10.1 Registration and Identity Proofing
150(1)
10.2 Authorization and Accountability
150(2)
10.3 Effective Password Mechanisms
152(7)
11 Integrate Identity as a Third-Party Service
159(8)
11.1 Identity Management Techniques
159(5)
11.2 Credential Management Systems
164(3)
12 Implement and Manage Authorization Mechanisms
167(6)
13 Managing the Identity and Access Provisioning Life Cycle
173(8)
14 Conduct Security Control Testing
181(12)
15 Collect Security Process Data
193(8)
16 Recovery Strategies for Database
201(8)
17 Analyze Test Output and Generate a Report
209(6)
18 Ensure Appropriate Asset Retention
215(8)
19 Determine Information and Security Controls
223(8)
References 231
Dr. Bharat S. Rawal (D.Sc.-SM-IEEE) is currently serving as Department Chair of Computer and Data Science & Full   Professor at Capitol Technology University, Laurel, MD.  Before Joining Capitol Technology University , he served as an Associate Professor and Program Director for Cybersecurity & Cyber Engineering programs at Gannon University at Erie, PA.  and an Assistant professor in the Department of Information Sciences and Technologies, Pennsylvania State University, Abington. Before joining Penn State, he was at Duke University as Visiting Assistant Professor. His research interests include cyberspace security, networking, and Blockchain. Prior to entering academia, Dr. Rawal has served as a CEO for the Pharmaceutical and Cyber Security industries. He has published around 100 of articles in journals and conference proceedings. His area of research interest is, Networking, Network Security, Blockchain, HPC and AI. He is a Guest Editor for variousinternational journals including Springer, Elsevier, Intercedence, IGI, Taylor Francis. 

Dr. Gunasekaran Manogaran received the B.E. degree in computer science from Anna University, Chennai, Tamil Nadu, India, in 2010, and the M.Tech. and Ph.D. degrees in information technology from Vellore Institute of Technology, Vellore, Tamil Nadu, India, in 2012 and 2017, respectively., He is currently working as a Visiting Researcher in Computer and Information Science Department, Gannon University, Erie, USA. He was worked as a Big Data Scientist with the University of California, Davis, CA, USA. He has worked as a Research Assistant for a project on spatial data mining funded by the Indian Council of Medical Research, Government of India. He has authored/coauthored papers in conferences, book chapters, and journals. His current research interests include data mining, big data analytics, and soft computing. Dr. Manogaran is a member of the International Society for Infectious Diseases and Machine Intelligence Research labs. He is on the reviewer board of several international journals and has been a member of the Program Committee for several international/national conferences and workshops. He is a Co-Investigator for the project entitled Agent Based Modeling of HIV epidemic in state of Telangana, India¡± funded by Pitt Public Health, Pittsburgh University, USA. He currently serves on Technical Program Committee for 2018 IEEE International Conference on Consumer Electronics (ICCE) in Las Vegas, USA. He is the Guest Editor for various international journals including IEEE, Springer, Elsevier, Intercedence, IGI, Taylor Francis and Emerald publishing. He is the recipient of an award for Young Investigator from India and Southeast Asia by Bill and Melinda Gates Foundation, USA. Dr. Alexander Peter is an award-winning hands-on Senior Executive and Board Member with more than 20 years of success ac^ understand wisdom (unsupervised).  Leveraging extensive experience in big data management and intelligent process optimization/automation, he is a valuable advisor for an organization looking to develop their KPI, scorecards, and/or executive dashboard. His broad areas of expertise include business intelligence, artificial intelligence, data management/engineering, cloud/mobile computing and Cryptocurrency/Blockchain, managing Bitcoin, and Ethereum smart contract mining hardware using over 1 Ph/s - 1000 Trillion Hashes per second infrastructure.