Advanced Cybersecurity Technologies

Advanced Cybersecurity Technologies
Author :
Publisher : CRC Press
Total Pages : 172
Release :
ISBN-10 : 9781000514605
ISBN-13 : 1000514609
Rating : 4/5 (609 Downloads)

Book Synopsis Advanced Cybersecurity Technologies by : Ralph Moseley

Download or read book Advanced Cybersecurity Technologies written by Ralph Moseley and published by CRC Press. This book was released on 2021-12-14 with total page 172 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at – revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Advanced Cybersecurity Technologies Related Books

Advanced Cybersecurity Technologies
Language: en
Pages: 172
Authors: Ralph Moseley
Categories: Computers
Type: BOOK - Published: 2021-12-14 - Publisher: CRC Press

GET EBOOK

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain r
Advanced Cybersecurity Technologies
Language: en
Pages: 225
Authors: Ralph Moseley
Categories: Computers
Type: BOOK - Published: 2021-12-06 - Publisher: CRC Press

GET EBOOK

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain r
Advanced Smart Computing Technologies in Cybersecurity and Forensics
Language: en
Pages: 258
Authors: Keshav Kaushik
Categories: Computers
Type: BOOK - Published: 2021-12-15 - Publisher: CRC Press

GET EBOOK

This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together resea
Enterprise Cybersecurity
Language: en
Pages: 508
Authors: Scott Donaldson
Categories: Computers
Type: BOOK - Published: 2015-05-23 - Publisher: Apress

GET EBOOK

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of m
Cybersecurity
Language: en
Pages: 238
Authors: Gautam Kumar
Categories: Computers
Type: BOOK - Published: 2021-09-13 - Publisher: CRC Press

GET EBOOK

It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for I