|
![]() |
|||
|
||||
OverviewDesigned for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that emphasizes not only techniques but also the mindset. The book includes an introduction to networks, backups, history of the field, career information, and a glossary of key terms including US government acronyms. Emphasizing the key components of information security, key topics include physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, and sandboxing. FEATURES: Examples to help the reader learn to identify suspect activity. Promotes an approach that emphasizes preparation and prevention while describing the tools and techniques in detection of problems and steps for recovery. SELECTED TOPICS: Physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, sandboxing, networks, backups, a history of the field, career information, and a glossary of key terms including US government acronyms. Full Product DetailsAuthor: S. Westcott , J. Riescher WestcottPublisher: Mercury Learning & Information Imprint: Mercury Learning & Information ISBN: 9781683922032ISBN 10: 1683922034 Pages: 400 Publication Date: 28 February 2023 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationSean Westcott has worked in electronics, networking and cybersecurity. He is a co-author of Basic Electronics: Theory and Practice 2/e (Mercury Learning). His Twitter handle is @basementhacker. Jean Riescher Westcott has written broadly on technology in books and online. She is a co-author of Industrial Automation and Robotics (Mercury Learning and Information) and with Sean Westcott, Basic Electronics: Theory and Practice 2/E (Mercury Learning and Information) Tab Content 6Author Website:Countries AvailableAll regions |