Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition)

Par : Rajesh Kumar Goutam
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
  • Non compatible avec un achat hors France métropolitaine
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN978-93-90684-73-1
  • EAN9789390684731
  • Date de parution31/05/2021
  • Protection num.Adobe DRM
  • Infos supplémentairesepub
  • ÉditeurBPB Publications

Résumé

Cybersecurity for Beginners KEY FEATURES  ? In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism.? Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure.? Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. DESCRIPTION Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of 'Cybersecurity' as an international problem.
This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure.
This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays. WHAT YOU WILL LEARN? Get to know Cybersecurity in Depth along with Information Security and Network Security.? Build Intrusion Detection Systems from scratch for your enterprise protection.? Explore Stepping Stone Detection Algorithms and put into real implementation.? Learn to identify and monitor Flooding-based DDoS Attacks.
WHO THIS BOOK IS FOR  This book is useful for students pursuing B. Tech.(CS)/M. Tech.(CS), B. Tech.(IT)/M. Tech.(IT), B. Sc (CS)/M. Sc (CS), B. Sc (IT)/M. Sc (IT), and B. C. A/M. C. A. The content of this book is important for novices who are interested to pursue their careers in cybersecurity. Anyone who is curious about Internet security and cybercrime can read this book too to enhance their knowledge. AUTHOR BIO Dr.
Rajesh Kumar Goutam is working as an Assistant professor in the Department of Computer Science, University of Lucknow. He has over 10 years of experience in teaching and research in the field of Computer Science. He did his MCA from Uttar Pradesh Technical University, Lucknow and earned his Ph. D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow. His interest lies in developing the framework to detect the true source of cybercrimes and to track the criminals across digital infrastructures.
He has contributed to the cybersecurity field through his several publications in various journals of repute. He is an active member of various professional bodies too. 
Cybersecurity for Beginners KEY FEATURES  ? In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism.? Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure.? Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. DESCRIPTION Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of 'Cybersecurity' as an international problem.
This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure.
This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays. WHAT YOU WILL LEARN? Get to know Cybersecurity in Depth along with Information Security and Network Security.? Build Intrusion Detection Systems from scratch for your enterprise protection.? Explore Stepping Stone Detection Algorithms and put into real implementation.? Learn to identify and monitor Flooding-based DDoS Attacks.
WHO THIS BOOK IS FOR  This book is useful for students pursuing B. Tech.(CS)/M. Tech.(CS), B. Tech.(IT)/M. Tech.(IT), B. Sc (CS)/M. Sc (CS), B. Sc (IT)/M. Sc (IT), and B. C. A/M. C. A. The content of this book is important for novices who are interested to pursue their careers in cybersecurity. Anyone who is curious about Internet security and cybercrime can read this book too to enhance their knowledge. AUTHOR BIO Dr.
Rajesh Kumar Goutam is working as an Assistant professor in the Department of Computer Science, University of Lucknow. He has over 10 years of experience in teaching and research in the field of Computer Science. He did his MCA from Uttar Pradesh Technical University, Lucknow and earned his Ph. D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow. His interest lies in developing the framework to detect the true source of cybercrimes and to track the criminals across digital infrastructures.
He has contributed to the cybersecurity field through his several publications in various journals of repute. He is an active member of various professional bodies too.