Network and Data Security for Non-Engineers
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variatio...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Groom, Frank M |
description | Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example. |
doi_str_mv | 10.1201/9781315381138 |
format | Book |
fullrecord | <record><control><sourceid>proquest_skill</sourceid><recordid>TN_cdi_skillsoft_books24x7_bks000117421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC4689438</sourcerecordid><originalsourceid>FETCH-LOGICAL-a36581-7d059181de769c8ddc3eae30f652d7170ce4ba0b2c582e540d631c2014b6da993</originalsourceid><addsrcrecordid>eNqNkkFv1DAQhY0QiKrskXuEkBBCCx7bie0jXbaAVJUDiKs1sZ3WJLWLnW7pv292s0IqcNiTNdI3b96bMSEvgL4DRuG9lgo41FwBcPWILLa10Eo2Umn5-K_6KTnStYaaMq6fkUUpPymlIIEqoY_I23M_3qbcVxhd9RFHrL55e5PDeFd1KVfnKS7X8SJE73N5Tp50OBS_2L_H5Mfp-vvq8_Ls66cvqw9nS-RNrWApHZ0GKnBeNtoq5yz36Dntmpo5CZJaL1qkLbO1Yr4W1DUc7BRMtI1DrfkxeT0Llz4MQ0ndaNqU-sLEb2navmwDgBQMJvLNTGLp_W25TMNYzGbwO9w82MMB7J-dHshOO4Wt21d7t9hhDrNVs2H_YPtQ1zn9uvFlNDs16-OYcTDrk5VolBa74WImQ5xucIXTfQZnRrwbUu4yRhvK_z2vD2sDarbf6GG72UwXDimySeflrGOx4BBiMFcppouM15fFCK11oxS_B9iFvks</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4689438</pqid></control><display><type>book</type><title>Network and Data Security for Non-Engineers</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Groom, Frank M</creator><contributor>Jones, Stephan S ; Groom, Kevin</contributor><creatorcontrib>Groom, Frank M ; Jones, Stephan S ; Groom, Kevin</creatorcontrib><description>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</description><edition>1</edition><identifier>ISBN: 9781498767897</identifier><identifier>ISBN: 1498767893</identifier><identifier>ISBN: 9781138436800</identifier><identifier>ISBN: 1138436801</identifier><identifier>ISBN: 9781498767866</identifier><identifier>ISBN: 1498767869</identifier><identifier>ISBN: 9781315350219</identifier><identifier>ISBN: 1315350211</identifier><identifier>EISBN: 9781498767897</identifier><identifier>EISBN: 9781315381138</identifier><identifier>EISBN: 1315381133</identifier><identifier>EISBN: 1498767893</identifier><identifier>EISBN: 9781315350219</identifier><identifier>EISBN: 1315350211</identifier><identifier>DOI: 10.1201/9781315381138</identifier><identifier>OCLC: 959150239</identifier><identifier>LCCallNum: TK5105.59 .G76 2017</identifier><language>eng</language><publisher>United Kingdom: Auerbach Publications</publisher><subject>Computer networks ; Data processing Computer science ; ElectricalEngineeringnetBASE ; ENGnetBASE ; INFORMATIONSCIENCEnetBASE ; InfoSECURITYnetBASE ; IT Security ; ITECHnetBASE ; Networks ; SCI-TECHnetBASE ; Security measures ; STMnetBASE</subject><creationdate>2016</creationdate><tpages>257</tpages><tpages>16</tpages><tpages>273</tpages><format>257</format><rights>2017 by Taylor & Francis Group, LLC</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Technology for Non-Engineers</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,777,781,783,24743,24761,27906</link.rule.ids></links><search><contributor>Jones, Stephan S</contributor><contributor>Groom, Kevin</contributor><creatorcontrib>Groom, Frank M</creatorcontrib><title>Network and Data Security for Non-Engineers</title><description>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</description><subject>Computer networks</subject><subject>Data processing Computer science</subject><subject>ElectricalEngineeringnetBASE</subject><subject>ENGnetBASE</subject><subject>INFORMATIONSCIENCEnetBASE</subject><subject>InfoSECURITYnetBASE</subject><subject>IT Security</subject><subject>ITECHnetBASE</subject><subject>Networks</subject><subject>SCI-TECHnetBASE</subject><subject>Security measures</subject><subject>STMnetBASE</subject><isbn>9781498767897</isbn><isbn>1498767893</isbn><isbn>9781138436800</isbn><isbn>1138436801</isbn><isbn>9781498767866</isbn><isbn>1498767869</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><isbn>9781498767897</isbn><isbn>9781315381138</isbn><isbn>1315381133</isbn><isbn>1498767893</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2016</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><sourceid>OODEK</sourceid><recordid>eNqNkkFv1DAQhY0QiKrskXuEkBBCCx7bie0jXbaAVJUDiKs1sZ3WJLWLnW7pv292s0IqcNiTNdI3b96bMSEvgL4DRuG9lgo41FwBcPWILLa10Eo2Umn5-K_6KTnStYaaMq6fkUUpPymlIIEqoY_I23M_3qbcVxhd9RFHrL55e5PDeFd1KVfnKS7X8SJE73N5Tp50OBS_2L_H5Mfp-vvq8_Ls66cvqw9nS-RNrWApHZ0GKnBeNtoq5yz36Dntmpo5CZJaL1qkLbO1Yr4W1DUc7BRMtI1DrfkxeT0Llz4MQ0ndaNqU-sLEb2navmwDgBQMJvLNTGLp_W25TMNYzGbwO9w82MMB7J-dHshOO4Wt21d7t9hhDrNVs2H_YPtQ1zn9uvFlNDs16-OYcTDrk5VolBa74WImQ5xucIXTfQZnRrwbUu4yRhvK_z2vD2sDarbf6GG72UwXDimySeflrGOx4BBiMFcppouM15fFCK11oxS_B9iFvks</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Groom, Frank M</creator><general>Auerbach Publications</general><general>CRC Press</general><general>Auerbach Publishers, Incorporated</general><general>CRC Press, Taylor and Francis Group</general><scope>I4C</scope><scope>OHILO</scope><scope>OODEK</scope></search><sort><creationdate>2016</creationdate><title>Network and Data Security for Non-Engineers</title><author>Groom, Frank M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a36581-7d059181de769c8ddc3eae30f652d7170ce4ba0b2c582e540d631c2014b6da993</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer networks</topic><topic>Data processing Computer science</topic><topic>ElectricalEngineeringnetBASE</topic><topic>ENGnetBASE</topic><topic>INFORMATIONSCIENCEnetBASE</topic><topic>InfoSECURITYnetBASE</topic><topic>IT Security</topic><topic>ITECHnetBASE</topic><topic>Networks</topic><topic>SCI-TECHnetBASE</topic><topic>Security measures</topic><topic>STMnetBASE</topic><toplevel>online_resources</toplevel><creatorcontrib>Groom, Frank M</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection><collection>O'Reilly Online Learning: Corporate Edition</collection><collection>O'Reilly Online Learning: Academic/Public Library Edition</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Groom, Frank M</au><au>Jones, Stephan S</au><au>Groom, Kevin</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Network and Data Security for Non-Engineers</btitle><seriestitle>Technology for Non-Engineers</seriestitle><date>2016</date><risdate>2016</risdate><isbn>9781498767897</isbn><isbn>1498767893</isbn><isbn>9781138436800</isbn><isbn>1138436801</isbn><isbn>9781498767866</isbn><isbn>1498767869</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><eisbn>9781498767897</eisbn><eisbn>9781315381138</eisbn><eisbn>1315381133</eisbn><eisbn>1498767893</eisbn><eisbn>9781315350219</eisbn><eisbn>1315350211</eisbn><abstract>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</abstract><cop>United Kingdom</cop><pub>Auerbach Publications</pub><doi>10.1201/9781315381138</doi><oclcid>959150239</oclcid><tpages>257</tpages><tpages>16</tpages><tpages>273</tpages><edition>1</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9781498767897 |
ispartof | |
issn | |
language | eng |
recordid | cdi_skillsoft_books24x7_bks000117421 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | Computer networks Data processing Computer science ElectricalEngineeringnetBASE ENGnetBASE INFORMATIONSCIENCEnetBASE InfoSECURITYnetBASE IT Security ITECHnetBASE Networks SCI-TECHnetBASE Security measures STMnetBASE |
title | Network and Data Security for Non-Engineers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T11%3A45%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_skill&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Network%20and%20Data%20Security%20for%20Non-Engineers&rft.au=Groom,%20Frank%20M&rft.date=2016&rft.isbn=9781498767897&rft.isbn_list=1498767893&rft.isbn_list=9781138436800&rft.isbn_list=1138436801&rft.isbn_list=9781498767866&rft_id=info:doi/10.1201/9781315381138&rft_dat=%3Cproquest_skill%3EEBC4689438%3C/proquest_skill%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781498767897&rft.eisbn_list=9781315381138&rft.eisbn_list=1315381133&rft.eisbn_list=1498767893&rft.eisbn_list=9781315350219&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4689438&rft_id=info:pmid/&rfr_iscdi=true |