Advanced cybersecurity technologies
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2022
|
Ausgabe: | First edition |
Online-Zugang: | DE-1050 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Inhaltsangabe:
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Biography
- Abbreviations and Acronyms
- Chapter 1 Introduction
- Chapter 2 Web and network basics
- Networks
- Application layer
- Presentation layer
- Session layer
- Transport layer
- Network layer
- Data link layer
- Physical layer
- How the OSI model works
- TCP/IP model
- Application layer
- Transport layer
- Internet layer
- Link layer
- Protocols and ports
- UDP and TCP
- Web specifics
- HTTP
- HTTP resources
- HTTP connections
- Conversations with a server
- UPnP
- Remote access protocols
- SSH
- Suggested projects and experiments
- Deploy Apache
- Deploy a Droplet or virtual server
- References
- Chapter 3 Cryptography
- Why we need cryptography
- Classical cryptography
- Substitution ciphers
- Frequency analysis
- Caesar cipher
- Vigenere cipher
- The one-time pad
- Modern algorithms
- Practical encryption engineering
- Encryption in Node.js
- Hashes
- Python cryptography
- Steganography
- Terminology and basics
- Images
- Audio encryption
- Least significant bit (LSB) coding
- Phase encoding
- Spread spectrum
- Parity encoding
- Echo hiding
- DeepSound
- Using stenography practically
- Digital watermarking
- Suggested projects
- Chapter 4 Hacking overview
- Case histories
- a context and background of hacks and hacker's motivations
- Worms
- Viruses
- Deception
- File replication
- Trojan
- Botnets
- DDoS
- Motivations behind malware
- History
- Case history: Stuxnet
- Case history: Michael Calce (Aka MafiaBoy)
- Case history: Jonathan James
- Case history: Gary McKinnon
- Case history: Lauri Love
- Huawei
- Techniques
- Spoofing email
- the basis of phishing attack
- Bots and automated mechanisms
- Protocols
- Tests
- Resistance to social engineering
- Waste handling
- General advice
- Software protection
- Intelligence and research used for social engineering
- Sources
- Search engines
- Google Alerts
- Google/Bing images
- Using web archives
- Social media
- Specialized search engines
- Media
- documents, photographs, video
- Telephone numbers and addresses
- Online tracing with IP addresses and presence
- Conclusions
- References
- Chapter 7 Cyber countermeasures
- Introduction
- Training
- Firewalls
- Linux
- Cloud
- Shields
- Malware detection
- Websites