Network and Data Security for Non-Engineers

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security
Cover of the book Network and Data Security for Non-Engineers by Frank M. Groom, Kevin Groom, Stephan S. Jones, CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Frank M. Groom, Kevin Groom, Stephan S. Jones ISBN: 9781315350219
Publisher: CRC Press Publication: August 19, 2016
Imprint: Auerbach Publications Language: English
Author: Frank M. Groom, Kevin Groom, Stephan S. Jones
ISBN: 9781315350219
Publisher: CRC Press
Publication: August 19, 2016
Imprint: Auerbach Publications
Language: English

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

More books from CRC Press

Cover of the book Public Private Partnerships in International Construction by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Biodeterioration of Concrete by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Nanomaterials in Energy Devices by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Environmental Impacts of Mining Monitoring, Restoration, and Control by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Leadership Strategies in the Age of Big Data, Algorithms, and Analytics by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book General Fractional Derivatives by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Powdered Detergents by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Sterilization Validation and Routine Operation Handbook (2001) by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Clinical Radiotherapy Physics with MATLAB by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Theory Of Quantum Liquids by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Hydrodynamics of Estuaries by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Spectroscopic Membrane Probes by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book SBAs and EMQs for the MRCS Part A: A Bailey & Love Revision Guide by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Artificial Intelligence Tools by Frank M. Groom, Kevin Groom, Stephan S. Jones
Cover of the book Calkin Algebras and Algebras of Operators on Banach SPates by Frank M. Groom, Kevin Groom, Stephan S. Jones
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy