Network and data security for non-engineers

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variatio...

Full description

Saved in:
Bibliographic Details
Main Author: Groom, Frank M.
Other Authors: Groom, Kevin M., Jones, Stephan
Format: Manuscript Book
Language:English
Published: United States Taylor Francis Inc 2017
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000ntm a2200000 i 4501
001 wils-911755
005 2018112125342
008 180319t2017 XXU ag| |#001 ##ENG#D
020 # # |a 9781498767866  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |h eng 
090 0 0 |a TK5105.59  |b .G78 2017 
100 1 # |a Groom, Frank M. 
245 1 0 |a Network and data security for non-engineers  |c Frank M. Groom, Kevin Groom, and Stephan S. Jones 
264 # 1 |a United States  |b Taylor Francis Inc  |c 2017 
264 # 4 |c ©2017 
300 # # |a xiii, 257 pages :  |b illustrations  |c 25 cm 
336 # # |b rdacontent  |2 text 
337 # # |b rdamedia  |2 unmediated 
338 # # |b rdacarrier  |2 volume 
504 # # |a Includes bibliographical references and index 
520 # # |a Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example. 
650 # # |a Computer networks  |x Security measures 
700 1 # |a Groom, Kevin M. 
700 1 # |a Jones, Stephan 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=911755 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||