It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 02648cam 2200361 i 4500
001 9925304402401661
005 20170718054206.3
008 160321s2017 flua b 001 0 eng
010 $a 2016008261
020 $a9781498767866$qpaperback
020 $a1498767869$qpaperback
035 $a99975450466
035 $a(OCoLC)947953996
035 $a(OCoLC)ocn947953996
040 $aDLC$beng$erda$cDLC$dOCLCO$dOCLCF$dYDX$dYDX$dOCLCO$dHF9$dCHVBK$dOCLCO$dVFL
042 $apcc
050 00 $aTK5105.59$b.G78 2017
082 00 $a005.8$223
100 1 $aGroom, Frank M.,$eauthor.
245 10 $aNetwork and data security for non-engineers /$cFrank M. Groom, Kevin Groom, Stephan S. Jones.
264 1 $aBoca Raton, FL :$bCRC Press, Taylor & Francis Group,$c[2017]
300 $axvi, 257 pages ;$c26 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aIntroduction to security threats -- The 2014--2015 Anthem Blue Cross and Blue Shield break-in case study -- Anonymous persistent threats -- Creating secure code -- Providing a secure architecture -- The hacker strategy : expanded -- Malware, viruses, worms, bugs, and botnets -- Cryptography and the RSA algorithm -- Browser security and cross-site scripting-- Banking security, Zeus, and SpyEye -- Web application security -- Session managment, user authentication, and web application security -- Web security, DNS security, and the internet -- Network security and defenses -- Network security protocols and defensive mechanisms -- The Stuxnet Worm and the vulnerability of the U.S. electric power grid -- Cyber-warfare.
520 $aLearn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example. -- Provided by publisher.
650 0 $aComputer networks$xSecurity measures.
700 1 $aGroom, Kevin M.,$eauthor.
700 1 $aJones, Stephan,$eauthor.
947 $hCIRCSTACKS$r31786103108442
980 $a99975450466