CRC Press - Network And Data Security For Non-Engineers (2017 EN)

Discussion in 'Information Technologies' started by Kanka, Nov 12, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    10,498
    Likes Received:
    276
    Trophy Points:
    83
    [​IMG]

    Author: Frank M. Groom, Kevin Groom, Stephan S. Jones
    Full Title: Network And Data Security For Non-Engineers
    Publisher: Auerbach Publications (August 22, 2016)
    Year: 2017
    ISBN-13: 9781498767866 (978-1-4987-6786-6)
    ISBN-10: 1498767869
    Pages: 257
    Language: English
    Genre: Network Security
    File type: EPUB (True)
    Quality: 10/10
    Price: £49.99


    Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.


    Features:
    ✓ Teaches network and data security by analyzing the Anthem breach
    ✓ Explains step-by-step how hackers gain entry, place hidden software, download information, and hide evidence of their entry
    ✓ Discusses the tools establishing persistent presence in the systems, use of those sites as testbeds to determine successful variations of software that elude detection, and the ability to reach out across trusted connections to the entire healthcare system of the nation
    ✓ Examines general principles of a secure system and how hackers approach such systems
    ✓ Dissects forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example

    -------------
     

Share This Page