
- 293 pages
- English
- PDF
- Available on iOS & Android
Advance Cyber Security
About this book
Now a Days, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks. The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation. Numerous policy proposals have been advanced, and a number of bills have been introduced in Congress to tackle parts of the cyber security challenge. This book is designed to serve as the textbook for a semester course devoted to cyber security. It is focused on helping students acquired the skills sought in the professional workforce.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright
- ABOUT THE AUTHORS
- TABLE OF CONTENTS
- List of Figures
- List of Tables
- List of Abbreviations
- Acknowledgment
- Prologue
- Preface
- Chapter 1 Introduction to Cybercrime
- Chapter 2 System Vulnerabilities
- Chapter 3 Network Security
- Chapter 4 Cyber Forensics
- Chapter 5 IR - Incident Response
- Chapter 6 Online Safety and Precautions
- Practical Approach
- Index
- Back Cover