Cyber Security /

Mack, Markus

Cyber Security / Markus Mack - London: Ed-Tech Press, 2018. - 337hbk.: ill.:

Contents: 1. Cyber Security, 2. Networking Security, 3. Security Threats and Vulnerabilities, 4. Server Management Security and Firewalls, 5. System Security.

Cybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems. Cyber security is a distributed problem partly because of the distributed nature of the underlying infrastructure and partly because industries, government and individuals all come at it with different perspectives. Under these circumstances regulation is best attempted from the bottom up, and legalisation, especially in the area of criminal law, should be sharply focused. There is the need for distributed approaches instead of the more traditional single, concentrated approach. Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cybersecurity training teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies. The spread of modern information technologies has brought about considerable changes in the global environment, ranging from the speed of economic transactions to the nature of social interactions to the management of military operations in both peacetime and war. The development of information technology makes it possible for adversaries to attack each other in new ways and with new forms of damage, and may create new targets for attack. This book fully introduces the theory and practice of cyber security. Comprehensive in scope, it covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It treats both the management and engineering issues of computer security.

9781788823074


Computer Science, IT, Cyber Security

005.8 / MAC

Powered by Koha