
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
About this book
The University of Florida has an ambitious goal: to harness the power of its faculty, staff, students, and alumni to solve some of society's most pressing problems and to become a resource for the state of Florida, the nation, and the world.
Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices—everything from computers and mobile phones to traffic cameras and pacemakers—will reach 50 billion by 2050. That number is staggering, and so are the vulnerabilities.
Networked devices like smart power grids and TVs need to be easily accessible, but they also need to be secure. The more access points a device like a self-driving car has, the more susceptible points adversaries, cyber terrorists or hackers, can attack. Yet device manufacturers mostly favor usability, and security is all too often sacrificed.
At the University of Florida some of the brightest minds in cybersecurity related fields have teamed together to form the Florida Institute for Cybersecurity Research. From industry, academe, and government, members of the FICS Research collaborate and bring together expertise in all aspects of cybersecurity and assurance, including hardware, network, mobile, big data, the internet of things (IOT), applied cryptography, social sciences, law, and more.
In Plugged In, we meet the men and women at the Florida Institute for Cybersecurity Research who have devoted their careers to studying and staying one step ahead of the bad guys.
The stories chronicled in GATORBYTES span all colleges and units across the UF campus. They detail the far-reaching impact of UF's research, technologies, and innovations—and the UF faculty members dedicated to them. Gatorbytes describe how UF is continuing to build on its strengths and extend the reach of its efforts so that it can help even more people in even more places.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Plugged In by Jon Silman,University of Florida in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Cover
- Title Page
- Contents
- 1. What Is Cybersecurity?
- 2. The Institute and the Preeminence Initiative
- 3. The Internet of Things
- 4. Juan Gilbert and His Voting Machine
- 5. How Does a Network Work?
- 6. Servers and Their Relationship to Cybersecurity
- 7. The Cloud and the Myth of Storage in the Sky
- 8. Kevin Butler and the Importance of Data Provenance
- 9. The Operating System
- 10. Michael Fang on Wireless Security
- 11. The Proliferation of the Hacker
- 12. What Exactly Is Malware?
- 13. Joseph Wilson on Hacking and Malware
- 14. Who Are the Adversaries?
- 15. Mark Tehranipoor and Chip Security
- 16. The Specific Challenges of Mobile Security
- 17. Patrick Traynor and Mobile Security
- 18. A Look at Social Engineering and Phishing Attacks
- 19. Daniela Oliveira on Social Engineering
- 20. Internet Censorship and the Tools to Fight It
- 21. Tom Shrimpton and the Science of Modern Cryptography
- 22. Swarup Bhunia and the Security of Integrated Circuits
- 23. Prabhat Mishra and System Validation
- 24. Domenic Forte and His Hardware Security Research
- 25. Staying Safe Online: What You Can Do
- Notes
- Copyright