Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Versatile Cybersecurity, Mauro Conti; Gaurav Somani; Radha Poovendran


Варианты приобретения
Цена: 23757.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mauro Conti; Gaurav Somani; Radha Poovendran
Название:  Versatile Cybersecurity
ISBN: 9783319976426
Издательство: Springer
Классификация:



ISBN-10: 3319976427
Обложка/Формат: Hardcover
Страницы: 286
Вес: 0.74 кг.
Дата издания: 2018
Серия: Advances in Information Security
Язык: English
Издание: 1st ed. 2018
Иллюстрации: 51 illustrations, color; 19 illustrations, black and white; xvi, 286 p. 70 illus., 51 illus. in color.
Размер: 239 x 193 x 18
Читательская аудитория: Professional & vocational
Ключевые слова: Security
Основная тема: Computer Science
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field.
Дополнительное описание: 1 An Android-based Covert Channel Framework on Wearables Using Status Bar Notifications.- 2 Insider Threat Detection: Machine Learning Way.- 3 Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions.- 4 Protec



Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En

Автор: Evans Lester
Название: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En
ISBN: 1647482747 ISBN-13(EAN): 9781647482749
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Do you create tons of accounts you will never again visit? Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? Does your password contain a sequence of numbers, such as "123456"? This book will show you just how incredibly lucky you are that nobody`s hacked you before.

Cybersecurity Is Everybody`s Business: Solve the Security Puzzle for Your Small Business and Home

Автор: Schober Scott N., Schober Craig W.
Название: Cybersecurity Is Everybody`s Business: Solve the Security Puzzle for Your Small Business and Home
ISBN: 0996902260 ISBN-13(EAN): 9780996902267
Издательство: Неизвестно
Рейтинг:
Цена: 2752.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Since publication of his first book, Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe from phishing attacks, malware spying, ransomware, identity theft, major breaches and hackers who would compromise their security. We are all in this together which is why cybersecurity is everybody's business.

Scott and Craig Schober examine a multitude of cybersecurity issues affecting all of us including:

  • Cyber Insurance
  • Internet of Things
  • State Sponsored Hacking and Spying
  • Card Skimmers & Identity Theft
  • Social Engineering
  • Ransomware
  • Phishing Attacks
  • Vital Password Creation
  • Robocalls
  • Cryptocurrency
  • Virtual Private Networks

Scott and Craig Schober delve into the details of the latest cyber breaches that made headlines and continue to affect your small business and all consumers such as:

  • Ashley Madison Hack
  • Yahoo Hack
  • Marriott Hotel Hack
  • Anthem Hack
  • Equifax Hack
  • Uber Hack

Throughout Cybersecurity Is Everybody's Business, Scott and Craig not only contextualize the impact of these cyberattacks on your small business and daily lives, but also provide expert insight and a plan of attack for fending off future security breaches. Through tips and advice gained since his last book, Scott offers hope in the ever-changing world of cybersecurity.

Cybersecurity Essentials

Автор: Brooks Charles J., Craig Philip, Short Donald
Название: Cybersecurity Essentials
ISBN: 1119362393 ISBN-13(EAN): 9781119362395
Издательство: Wiley
Рейтинг:
Цена: 5227.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.

A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It

Автор: Parenty Thomas, Domet Jack
Название: A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It
ISBN: 1633697991 ISBN-13(EAN): 9781633697997
Издательство: NBN International
Рейтинг:
Цена: 5280.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.

Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide.

Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility.

In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes:

  • Understanding cyber risks and how best to control them
  • Planning and preparing for a crisis--and leading in its aftermath
  • Making cybersecurity a companywide initiative and responsibility
  • Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures
  • Aligning the board, executive leadership, and cybersecurity teams on priorities

Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.

Cybersecurity :

Автор: Harvard Business Review
Название: Cybersecurity :
ISBN: 1633697878 ISBN-13(EAN): 9781633697874
Издательство: TBS/GBS
Рейтинг:
Цена: 2968.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

No data is completely safe.

Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.

Cybersecurity: The Insights You Need from Harvard Business Review brings you today's most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical information you need to prepare your company for the inevitable hack. The lessons in this book will help you get everyone in your organization on the same page when it comes to protecting your most valuable assets.

Business is changing. Will you adapt or be left behind?
Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues--blockchain, cybersecurity, AI, and more--each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas--and prepare you and your company for the future.

Cybersecurity for Beginners: How to Get a Job in Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: How to Get a Job in Cybersecurity
ISBN: 1839380020 ISBN-13(EAN): 9781839380020
Издательство: Неизвестно
Рейтинг:
Цена: 3585.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

-Do you want to learn how to get real life experience in Information Technology?
-Do you want to know how you can get references, while making good money?
-Do you want to know how to increase your chances to get a Security job?


If the answer is yes to the above questions, this book is for you

-Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I don't have any certifications, and there are so many to choose from. Will this book help me understand the differences between certifications and degrees? Which one is better, and which ones do I need in order to get a job?
-Answer: Yes. This book will give you an overview of all Cybersecurity Certifications, and help you choose which one you should start with, according to your existing experience.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • How to get real life experience in Information Technology
  • How to get working experience by working for free
  • How to increase your chances to get a Security job
  • How you can get references, while making good money
  • How you can build your personal brand in Cybersecurity
  • How you can market yourself by providing value
  • How to network and make your presents visible
  • How to find the perfect employer in Cybersecurity
  • What responsibilities employers expect from you
  • How to become more valuable than the majority of candidates on the market
  • How you can find security certification that fits you best
  • What are the three most common entry level security roles
  • What daily tasks you must deliver in each position
  • What are the values of security certifications
  • How to become a successful Cybersecurity Professional
  • How you can apply yourself by your own unique view


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT

Автор: Wiem Tounsi
Название: Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT
ISBN: 1786304481 ISBN-13(EAN): 9781786304483
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead.

Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

The Language of Cybersecurity

Автор: Flores Maria Antonieta
Название: The Language of Cybersecurity
ISBN: 1937434621 ISBN-13(EAN): 9781937434625
Издательство: Неизвестно
Цена: 4773.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecurity, and every business professional also needs to be able to speak intelligently with cybersecurity professionals.

The Language of Cybersecurity introduces the world of cybersecurity through the terminology that defines the field. Each of the 52 main terms contains a definition, a statement of why the term is important, and an essay that explains why a business professional should know about the term.

Each term was authored by an expert practitioner in that area.

The Language of Cybersecurity looks at vulnerabilities, exploits, defenses, planning, and compliance. In addition there is a glossary that defines more than 80 additional. For those who want to dig deeper, there are more than 150 references for further exploration.

Expertly compiled and edited by Tonie Flores, this book is a useful reference for cybersecurity experts, managers, students, and anyone who uses a computer, tablet, smart phone, or other computing device.

Cybersecurity for Beginners: What You Must Know about Cybersecurity

Автор: Kovacs Attila
Название: Cybersecurity for Beginners: What You Must Know about Cybersecurity
ISBN: 1839380004 ISBN-13(EAN): 9781839380006
Издательство: Неизвестно
Рейтинг:
Цена: 3585.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

-Do you want to learn what it takes to become a Cybersecurity Specialist?
-Do you want to know what types of Cybersecurity roles exist and how much money can you make?
-Do you want to create or enhance your LinkedIn profile, so recruiters would find you?


If the answer is yes to the above questions, this book is for you

-Frequently Asked Questions
-Question: I don't have any experience in the field of Cybersecurity, should I get this book?
-Answer: This book is designed to those interested in Cybersecurity, and having limited, or no experience in the realm of Cybersecurity, or general Information Technology.

-Question: Are there any technical prerequisites for reading this book?
-Answer: No. This book is written in everyday English, and no technical experience required.

-Question: I don't know what entry level Cybersecurity role I can get into. Will this book help me?
-Answer: Yes. In this book, you will learn about all types of Security Roles exists today, as well the day to day operations, which will help you decide what security path suits you best.

-Question: I don't have any certifications, and there are so many to choose from. Will this book help me understand the differences between certifications and degrees? Which one is better, and which ones do I need in order to get a job?
-Answer: Yes. This book will give you an overview of all Cybersecurity Certifications, and help you choose which one you should start with, according to your existing experience.

-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?
-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more... Learning from someone with real life experience is extremely valuable, because you will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.


BUY THIS BOOK NOW, AND GET STARTED TODAY

IN THIS BOOK YOU WILL LEARN:

  • What types of roles exist in the field of Cybersecurity
  • What Key Concepts & Methodologies you must learn in Cybersecurity
  • What are the Key technologies that you should be aware
  • How to get started in the field of Cybersecurity.
  • What kind of Cybersecurity Entry Level Salary you can expect
  • How to plan and achieve a realistic targets, using networking skills
  • Comprehend market hypes revolving around education and certifications
  • How to overcome obstructions and get things done
  • How to become a project oriented Security Professional
  • What kind of Mindset you must have in Cybersecurity
  • How to express your unique voice in Cybersecurity
  • What HR and hiring managers expect from you
  • How to optimize your LinkedIn profile and get recruiters to find you
  • How to enhance your LinkedIn profile to vastly rank yourself


BUY THIS BOOK NOW, AND GET STARTED TODAY

Cyberspace, Cybersecurity, and Cybercrime

Автор: Kremling Janine, Parker Amanda M. Sharp
Название: Cyberspace, Cybersecurity, and Cybercrime
ISBN: 1506347258 ISBN-13(EAN): 9781506347257
Издательство: Sage Publications
Рейтинг:
Цена: 13306.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

Enterprise Cybersecurity Study Guide

Автор: Scott Donaldson; Stanley Siegel; Chris Williams; A
Название: Enterprise Cybersecurity Study Guide
ISBN: 1484232577 ISBN-13(EAN): 9781484232576
Издательство: Springer
Рейтинг:
Цена: 6288.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom.

Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum--what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit--gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.

Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.

People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.

What You'll Learn
  • Know the methodology of targeted attacks and why they succeed
  • Master the cybersecurity risk management process
  • Understand why cybersecurity capabilities are the foundation of effective cyberdefenses
  • Organize a cybersecurity program's policy, people, budget, technology, and assessment
  • Assess and score a cybersecurity program
  • Report cybersecurity program status against compliance and regulatory frameworks
  • Use the operational processes and supporting information systems of a successful cybersecurity program
  • Create a data-driven and objectively managed cybersecurity program
  • Discover how cybersecurity is evolving and will continue to evolve over the next decade

Who This Book Is For

Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.

Ethical Hacking: The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks for Beginn

Автор: Evans Lester
Название: Ethical Hacking: The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks for Beginn
ISBN: 1647481813 ISBN-13(EAN): 9781647481810
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

If you've always wanted to discover the startling world of ethical hacking, then keep reading...

Ever feel like you don't even own the hardware and software you paid dearly for?

Ever get the impression that you have to ask for permission before installing or changing a program on your device?

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?

You're not alone.

Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.

There's a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.

In a world where everything is slowly becoming more managed and overbearing, this book is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.

Here's just a tiny fraction of the topics covered in this book:

  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer's mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi
  • And much, much more

If you want to learn more about ethical hacking, then scroll up and click "add to cart"


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия