000 02991cam a22003498i 4500
001 21396501
003 OSt
005 20240215152121.0
008 200123s2020 flu b 001 0 eng
010 _a 2019058631
020 _a9780367472504
_q(paperback)
020 _a9780367476489
_q(hardback)
020 _z9781003035626
_q(ebook)
042 _apcc
082 0 0 _a005.8
_223
100 1 _aThakur, Kutub,
_eauthor.
_9106528
245 1 0 _aCybersecurity fundamentals :
_ba real-world perspective /
_cby Dr Kutub Thakur, PhD and Dr Al-Sakib Khan Pathan, PhD.
250 _aFirst edition.
263 _a2010
264 1 _aBoca Raton, FL :
_bCRC Press,
_c2020.
300 _app.288
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cyber security and different types of cyber attacks that hackers choose to unleash on cyber environments. The book then goes on to cover the types of major computer malwares and cyber security attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on the networks are described fully. It then covers high-tech cyber security programs, devices and mechanism that are extensively adopted in the modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. The book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step by step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with the book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of the book"--
_cProvided by publisher.
650 0 _aComputer networks
_xSecurity measures.
_9106529
700 1 _aPathan, Al-Sakib Khan,
_eauthor.
_9106530
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c84117
_d84117