Network and data security for non-engineers
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variatio...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Manuscript Book |
Language: | English |
Published: |
United States
Taylor Francis Inc
2017
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000ntm a2200000 i 4501 | ||
---|---|---|---|
001 | wils-911755 | ||
005 | 2018112125342 | ||
008 | 180319t2017 XXU ag| |#001 ##ENG#D | ||
020 | # | # | |a 9781498767866 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |h eng |
090 | 0 | 0 | |a TK5105.59 |b .G78 2017 |
100 | 1 | # | |a Groom, Frank M. |
245 | 1 | 0 | |a Network and data security for non-engineers |c Frank M. Groom, Kevin Groom, and Stephan S. Jones |
264 | # | 1 | |a United States |b Taylor Francis Inc |c 2017 |
264 | # | 4 | |c ©2017 |
300 | # | # | |a xiii, 257 pages : |b illustrations |c 25 cm |
336 | # | # | |b rdacontent |2 text |
337 | # | # | |b rdamedia |2 unmediated |
338 | # | # | |b rdacarrier |2 volume |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example. |
650 | # | # | |a Computer networks |x Security measures |
700 | 1 | # | |a Groom, Kevin M. |
700 | 1 | # | |a Jones, Stephan |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=911755 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |