Foundations of Cybersecurity, 2nd Edition. A Straightforward Introduction
Par :Formats :
Actuellement indisponible
Cet article est actuellement indisponible, il ne peut pas être commandé sur notre site pour le moment. Nous vous invitons à vous inscrire à l'alerte disponibilité, vous recevrez un e-mail dès que cet ouvrage sera à nouveau disponible.
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- Nombre de pages344
- FormatePub
- ISBN978-1-7185-0441-7
- EAN9781718504417
- Date de parution19/05/2026
- Protection num.pas de protection
- Infos supplémentairesepub
- ÉditeurNo Starch Press
Résumé
This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons. Cybersecurity is critical to protecting data, systems, and people. Whether you're new to the field, an IT professional strengthening your skills, or a manager shaping security policy, Foundations of Cybersecurity provides the knowledge and practice you need.
Building on the first edition (Foundations of Information Security), this updated guide covers the essentials: authentication, authorization, and auditing; cryptography; security architecture; threat assessment; network and OS hardening; application and IoT security; incident response; compliance; and the human factors attackers exploit. You'll learn how to: Apply the core principles of security across systems and networks Defend against emerging threats like AI-driven attacks and IoT vulnerabilities Manage incident response and governance, risk, and compliance (GRC) Strengthen defenses against social engineering and insider threats Explore career paths and skills for a future in cybersecurity What's New in This EditionIncludes a new chapter on AI security, expanded coverage of security operations and governance, and practical "Down the Rabbit Hole" labs in every chapter to help you practice real-world skills.
Whether you're new to the field, strengthening your skills, or guiding a team, this book will help you build a solid foundation for protecting systems, data, and people.
Building on the first edition (Foundations of Information Security), this updated guide covers the essentials: authentication, authorization, and auditing; cryptography; security architecture; threat assessment; network and OS hardening; application and IoT security; incident response; compliance; and the human factors attackers exploit. You'll learn how to: Apply the core principles of security across systems and networks Defend against emerging threats like AI-driven attacks and IoT vulnerabilities Manage incident response and governance, risk, and compliance (GRC) Strengthen defenses against social engineering and insider threats Explore career paths and skills for a future in cybersecurity What's New in This EditionIncludes a new chapter on AI security, expanded coverage of security operations and governance, and practical "Down the Rabbit Hole" labs in every chapter to help you practice real-world skills.
Whether you're new to the field, strengthening your skills, or guiding a team, this book will help you build a solid foundation for protecting systems, data, and people.
This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons. Cybersecurity is critical to protecting data, systems, and people. Whether you're new to the field, an IT professional strengthening your skills, or a manager shaping security policy, Foundations of Cybersecurity provides the knowledge and practice you need.
Building on the first edition (Foundations of Information Security), this updated guide covers the essentials: authentication, authorization, and auditing; cryptography; security architecture; threat assessment; network and OS hardening; application and IoT security; incident response; compliance; and the human factors attackers exploit. You'll learn how to: Apply the core principles of security across systems and networks Defend against emerging threats like AI-driven attacks and IoT vulnerabilities Manage incident response and governance, risk, and compliance (GRC) Strengthen defenses against social engineering and insider threats Explore career paths and skills for a future in cybersecurity What's New in This EditionIncludes a new chapter on AI security, expanded coverage of security operations and governance, and practical "Down the Rabbit Hole" labs in every chapter to help you practice real-world skills.
Whether you're new to the field, strengthening your skills, or guiding a team, this book will help you build a solid foundation for protecting systems, data, and people.
Building on the first edition (Foundations of Information Security), this updated guide covers the essentials: authentication, authorization, and auditing; cryptography; security architecture; threat assessment; network and OS hardening; application and IoT security; incident response; compliance; and the human factors attackers exploit. You'll learn how to: Apply the core principles of security across systems and networks Defend against emerging threats like AI-driven attacks and IoT vulnerabilities Manage incident response and governance, risk, and compliance (GRC) Strengthen defenses against social engineering and insider threats Explore career paths and skills for a future in cybersecurity What's New in This EditionIncludes a new chapter on AI security, expanded coverage of security operations and governance, and practical "Down the Rabbit Hole" labs in every chapter to help you practice real-world skills.
Whether you're new to the field, strengthening your skills, or guiding a team, this book will help you build a solid foundation for protecting systems, data, and people.