Advanced cybersecurity technologies

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Moseley, Ralph (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton ; London ; New York CRC Press 2022
Ausgabe:First edition
Online-Zugang:DE-1050
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Inhaltsangabe:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Dedication
  • Table of Contents
  • Biography
  • Abbreviations and Acronyms
  • Chapter 1 Introduction
  • Chapter 2 Web and network basics
  • Networks
  • Application layer
  • Presentation layer
  • Session layer
  • Transport layer
  • Network layer
  • Data link layer
  • Physical layer
  • How the OSI model works
  • TCP/IP model
  • Application layer
  • Transport layer
  • Internet layer
  • Link layer
  • Protocols and ports
  • UDP and TCP
  • Web specifics
  • HTTP
  • HTTP resources
  • HTTP connections
  • Conversations with a server
  • UPnP
  • Remote access protocols
  • SSH
  • Suggested projects and experiments
  • Deploy Apache
  • Deploy a Droplet or virtual server
  • References
  • Chapter 3 Cryptography
  • Why we need cryptography
  • Classical cryptography
  • Substitution ciphers
  • Frequency analysis
  • Caesar cipher
  • Vigenere cipher
  • The one-time pad
  • Modern algorithms
  • Practical encryption engineering
  • Encryption in Node​.​js
  • Hashes
  • Python cryptography
  • Steganography
  • Terminology and basics
  • Images
  • Audio encryption
  • Least significant bit (LSB) coding
  • Phase encoding
  • Spread spectrum
  • Parity encoding
  • Echo hiding
  • DeepSound
  • Using stenography practically
  • Digital watermarking
  • Suggested projects
  • Chapter 4 Hacking overview
  • Case histories
  • a context and background of hacks and hacker's motivations
  • Worms
  • Viruses
  • Deception
  • File replication
  • Trojan
  • Botnets
  • DDoS
  • Motivations behind malware
  • History
  • Case history: Stuxnet
  • Case history: Michael Calce (Aka MafiaBoy)
  • Case history: Jonathan James
  • Case history: Gary McKinnon
  • Case history: Lauri Love
  • Huawei
  • Techniques
  • Spoofing email
  • the basis of phishing attack
  • Bots and automated mechanisms
  • Protocols
  • Tests
  • Resistance to social engineering
  • Waste handling
  • General advice
  • Software protection
  • Intelligence and research used for social engineering
  • Sources
  • Search engines
  • Google Alerts
  • Google/Bing images
  • Using web archives
  • Social media
  • Specialized search engines
  • Media
  • documents, photographs, video
  • Telephone numbers and addresses
  • Online tracing with IP addresses and presence
  • Conclusions
  • References
  • Chapter 7 Cyber countermeasures
  • Introduction
  • Training
  • Firewalls
  • Linux
  • Cloud
  • Shields
  • Malware detection
  • Websites