000 02576nam a22002177a 4500
003 CUTN
005 20230424102744.0
008 230424b |||||||| |||| 00| 0 eng d
020 _a9781788823074
041 _aEnglish
082 _a005.8
_bMAC
100 _aMack, Markus
245 _aCyber Security /
_cMarkus Mack
260 _aLondon:
_bEd-Tech Press,
_c2018.
300 _a337hbk.:
_bill.:
505 _tContents: 1. Cyber Security, 2. Networking Security, 3. Security Threats and Vulnerabilities, 4. Server Management Security and Firewalls, 5. System Security.
520 _aCybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems. Cyber security is a distributed problem partly because of the distributed nature of the underlying infrastructure and partly because industries, government and individuals all come at it with different perspectives. Under these circumstances regulation is best attempted from the bottom up, and legalisation, especially in the area of criminal law, should be sharply focused. There is the need for distributed approaches instead of the more traditional single, concentrated approach. Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cybersecurity training teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies. The spread of modern information technologies has brought about considerable changes in the global environment, ranging from the speed of economic transactions to the nature of social interactions to the management of military operations in both peacetime and war. The development of information technology makes it possible for adversaries to attack each other in new ways and with new forms of damage, and may create new targets for attack. This book fully introduces the theory and practice of cyber security. Comprehensive in scope, it covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It treats both the management and engineering issues of computer security.
650 _aComputer Science, IT, Cyber Security
690 _aComputer Science
942 _2ddc
_cBOOKS
999 _c38459
_d38459