Network and Data Security for Non-Engineers

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Groom, Frank M
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Groom, Frank M
description Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
doi_str_mv 10.1201/9781315381138
format Book
fullrecord <record><control><sourceid>proquest_skill</sourceid><recordid>TN_cdi_skillsoft_books24x7_bks000117421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC4689438</sourcerecordid><originalsourceid>FETCH-LOGICAL-a36581-7d059181de769c8ddc3eae30f652d7170ce4ba0b2c582e540d631c2014b6da993</originalsourceid><addsrcrecordid>eNqNkkFv1DAQhY0QiKrskXuEkBBCCx7bie0jXbaAVJUDiKs1sZ3WJLWLnW7pv292s0IqcNiTNdI3b96bMSEvgL4DRuG9lgo41FwBcPWILLa10Eo2Umn5-K_6KTnStYaaMq6fkUUpPymlIIEqoY_I23M_3qbcVxhd9RFHrL55e5PDeFd1KVfnKS7X8SJE73N5Tp50OBS_2L_H5Mfp-vvq8_Ls66cvqw9nS-RNrWApHZ0GKnBeNtoq5yz36Dntmpo5CZJaL1qkLbO1Yr4W1DUc7BRMtI1DrfkxeT0Llz4MQ0ndaNqU-sLEb2navmwDgBQMJvLNTGLp_W25TMNYzGbwO9w82MMB7J-dHshOO4Wt21d7t9hhDrNVs2H_YPtQ1zn9uvFlNDs16-OYcTDrk5VolBa74WImQ5xucIXTfQZnRrwbUu4yRhvK_z2vD2sDarbf6GG72UwXDimySeflrGOx4BBiMFcppouM15fFCK11oxS_B9iFvks</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4689438</pqid></control><display><type>book</type><title>Network and Data Security for Non-Engineers</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Groom, Frank M</creator><contributor>Jones, Stephan S ; Groom, Kevin</contributor><creatorcontrib>Groom, Frank M ; Jones, Stephan S ; Groom, Kevin</creatorcontrib><description>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</description><edition>1</edition><identifier>ISBN: 9781498767897</identifier><identifier>ISBN: 1498767893</identifier><identifier>ISBN: 9781138436800</identifier><identifier>ISBN: 1138436801</identifier><identifier>ISBN: 9781498767866</identifier><identifier>ISBN: 1498767869</identifier><identifier>ISBN: 9781315350219</identifier><identifier>ISBN: 1315350211</identifier><identifier>EISBN: 9781498767897</identifier><identifier>EISBN: 9781315381138</identifier><identifier>EISBN: 1315381133</identifier><identifier>EISBN: 1498767893</identifier><identifier>EISBN: 9781315350219</identifier><identifier>EISBN: 1315350211</identifier><identifier>DOI: 10.1201/9781315381138</identifier><identifier>OCLC: 959150239</identifier><identifier>LCCallNum: TK5105.59 .G76 2017</identifier><language>eng</language><publisher>United Kingdom: Auerbach Publications</publisher><subject>Computer networks ; Data processing Computer science ; ElectricalEngineeringnetBASE ; ENGnetBASE ; INFORMATIONSCIENCEnetBASE ; InfoSECURITYnetBASE ; IT Security ; ITECHnetBASE ; Networks ; SCI-TECHnetBASE ; Security measures ; STMnetBASE</subject><creationdate>2016</creationdate><tpages>257</tpages><tpages>16</tpages><tpages>273</tpages><format>257</format><rights>2017 by Taylor &amp; Francis Group, LLC</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Technology for Non-Engineers</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,777,781,783,24743,24761,27906</link.rule.ids></links><search><contributor>Jones, Stephan S</contributor><contributor>Groom, Kevin</contributor><creatorcontrib>Groom, Frank M</creatorcontrib><title>Network and Data Security for Non-Engineers</title><description>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</description><subject>Computer networks</subject><subject>Data processing Computer science</subject><subject>ElectricalEngineeringnetBASE</subject><subject>ENGnetBASE</subject><subject>INFORMATIONSCIENCEnetBASE</subject><subject>InfoSECURITYnetBASE</subject><subject>IT Security</subject><subject>ITECHnetBASE</subject><subject>Networks</subject><subject>SCI-TECHnetBASE</subject><subject>Security measures</subject><subject>STMnetBASE</subject><isbn>9781498767897</isbn><isbn>1498767893</isbn><isbn>9781138436800</isbn><isbn>1138436801</isbn><isbn>9781498767866</isbn><isbn>1498767869</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><isbn>9781498767897</isbn><isbn>9781315381138</isbn><isbn>1315381133</isbn><isbn>1498767893</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2016</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><sourceid>OODEK</sourceid><recordid>eNqNkkFv1DAQhY0QiKrskXuEkBBCCx7bie0jXbaAVJUDiKs1sZ3WJLWLnW7pv292s0IqcNiTNdI3b96bMSEvgL4DRuG9lgo41FwBcPWILLa10Eo2Umn5-K_6KTnStYaaMq6fkUUpPymlIIEqoY_I23M_3qbcVxhd9RFHrL55e5PDeFd1KVfnKS7X8SJE73N5Tp50OBS_2L_H5Mfp-vvq8_Ls66cvqw9nS-RNrWApHZ0GKnBeNtoq5yz36Dntmpo5CZJaL1qkLbO1Yr4W1DUc7BRMtI1DrfkxeT0Llz4MQ0ndaNqU-sLEb2navmwDgBQMJvLNTGLp_W25TMNYzGbwO9w82MMB7J-dHshOO4Wt21d7t9hhDrNVs2H_YPtQ1zn9uvFlNDs16-OYcTDrk5VolBa74WImQ5xucIXTfQZnRrwbUu4yRhvK_z2vD2sDarbf6GG72UwXDimySeflrGOx4BBiMFcppouM15fFCK11oxS_B9iFvks</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Groom, Frank M</creator><general>Auerbach Publications</general><general>CRC Press</general><general>Auerbach Publishers, Incorporated</general><general>CRC Press, Taylor and Francis Group</general><scope>I4C</scope><scope>OHILO</scope><scope>OODEK</scope></search><sort><creationdate>2016</creationdate><title>Network and Data Security for Non-Engineers</title><author>Groom, Frank M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a36581-7d059181de769c8ddc3eae30f652d7170ce4ba0b2c582e540d631c2014b6da993</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer networks</topic><topic>Data processing Computer science</topic><topic>ElectricalEngineeringnetBASE</topic><topic>ENGnetBASE</topic><topic>INFORMATIONSCIENCEnetBASE</topic><topic>InfoSECURITYnetBASE</topic><topic>IT Security</topic><topic>ITECHnetBASE</topic><topic>Networks</topic><topic>SCI-TECHnetBASE</topic><topic>Security measures</topic><topic>STMnetBASE</topic><toplevel>online_resources</toplevel><creatorcontrib>Groom, Frank M</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection><collection>O'Reilly Online Learning: Corporate Edition</collection><collection>O'Reilly Online Learning: Academic/Public Library Edition</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Groom, Frank M</au><au>Jones, Stephan S</au><au>Groom, Kevin</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Network and Data Security for Non-Engineers</btitle><seriestitle>Technology for Non-Engineers</seriestitle><date>2016</date><risdate>2016</risdate><isbn>9781498767897</isbn><isbn>1498767893</isbn><isbn>9781138436800</isbn><isbn>1138436801</isbn><isbn>9781498767866</isbn><isbn>1498767869</isbn><isbn>9781315350219</isbn><isbn>1315350211</isbn><eisbn>9781498767897</eisbn><eisbn>9781315381138</eisbn><eisbn>1315381133</eisbn><eisbn>1498767893</eisbn><eisbn>9781315350219</eisbn><eisbn>1315350211</eisbn><abstract>Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.</abstract><cop>United Kingdom</cop><pub>Auerbach Publications</pub><doi>10.1201/9781315381138</doi><oclcid>959150239</oclcid><tpages>257</tpages><tpages>16</tpages><tpages>273</tpages><edition>1</edition></addata></record>
fulltext fulltext
identifier ISBN: 9781498767897
ispartof
issn
language eng
recordid cdi_skillsoft_books24x7_bks000117421
source O'Reilly Online Learning: Academic/Public Library Edition
subjects Computer networks
Data processing Computer science
ElectricalEngineeringnetBASE
ENGnetBASE
INFORMATIONSCIENCEnetBASE
InfoSECURITYnetBASE
IT Security
ITECHnetBASE
Networks
SCI-TECHnetBASE
Security measures
STMnetBASE
title Network and Data Security for Non-Engineers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T11%3A45%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_skill&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Network%20and%20Data%20Security%20for%20Non-Engineers&rft.au=Groom,%20Frank%20M&rft.date=2016&rft.isbn=9781498767897&rft.isbn_list=1498767893&rft.isbn_list=9781138436800&rft.isbn_list=1138436801&rft.isbn_list=9781498767866&rft_id=info:doi/10.1201/9781315381138&rft_dat=%3Cproquest_skill%3EEBC4689438%3C/proquest_skill%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781498767897&rft.eisbn_list=9781315381138&rft.eisbn_list=1315381133&rft.eisbn_list=1498767893&rft.eisbn_list=9781315350219&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4689438&rft_id=info:pmid/&rfr_iscdi=true