Cybersecurity and Identity Access Management
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The boo...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2023
|
Ausgabe: | 1st ed. 2023 |
Schlagworte: | |
Online-Zugang: | DE-1043 DE-91 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049646391 | ||
003 | DE-604 | ||
005 | 20240424 | ||
007 | cr|uuu---uuuuu | ||
008 | 240411s2023 xx a||| o|||| 00||| eng d | ||
020 | |a 9789811926587 |9 978-981-1926-58-7 | ||
024 | 7 | |a 10.1007/978-981-19-2658-7 |2 doi | |
035 | |a (ZDB-2-ENG)978-981-19-2658-7 | ||
035 | |a (OCoLC)1430760280 | ||
035 | |a (DE-599)BVBBV049646391 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-1043 | ||
082 | 0 | |a 621.382 | |
100 | 1 | |a Rawal, Bharat S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity and Identity Access Management |c by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2023 | |
300 | |a 1 Online-Ressource (X, 236 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls | ||
520 | |a This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. | ||
650 | 4 | |a Telecommunication | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Criminology | |
650 | 4 | |a Data protection | |
700 | 1 | |a Manogaran, Gunasekaran |e Verfasser |4 aut | |
700 | 1 | |a Peter, Alexender |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926570 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926594 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926600 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-19-2658-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
912 | |a ZDB-2-SXE | ||
940 | 1 | |q ZDB-2-ENG_2023 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034989913 | |
966 | e | |u https://doi.org/10.1007/978-981-19-2658-7 |l DE-1043 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-2658-7 |l DE-91 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2790116 |
---|---|
_version_ | 1820807733975187456 |
any_adam_object | |
author | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender |
author_facet | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender |
author_role | aut aut aut |
author_sort | Rawal, Bharat S. |
author_variant | b s r bs bsr g m gm a p ap |
building | Verbundindex |
bvnumber | BV049646391 |
collection | ZDB-2-ENG ZDB-2-SXE |
ctrlnum | (ZDB-2-ENG)978-981-19-2658-7 (OCoLC)1430760280 (DE-599)BVBBV049646391 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-981-19-2658-7 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03279nam a2200505zc 4500</leader><controlfield tag="001">BV049646391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240424 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2023 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811926587</subfield><subfield code="9">978-981-1926-58-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-2658-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-981-19-2658-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430760280</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049646391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-1043</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rawal, Bharat S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and Identity Access Management</subfield><subfield code="c">by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 236 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manogaran, Gunasekaran</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peter, Alexender</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926570</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926594</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926600</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SXE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2023</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034989913</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049646391 |
illustrated | Illustrated |
indexdate | 2024-12-24T10:12:00Z |
institution | BVB |
isbn | 9789811926587 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034989913 |
oclc_num | 1430760280 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-1043 |
owner_facet | DE-91 DE-BY-TUM DE-1043 |
physical | 1 Online-Ressource (X, 236 Seiten) Illustrationen |
psigel | ZDB-2-ENG ZDB-2-SXE ZDB-2-ENG_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer Nature Singapore |
record_format | marc |
spellingShingle | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender Cybersecurity and Identity Access Management Telecommunication Computer networks Security measures Criminology Data protection |
title | Cybersecurity and Identity Access Management |
title_auth | Cybersecurity and Identity Access Management |
title_exact_search | Cybersecurity and Identity Access Management |
title_full | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_fullStr | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_full_unstemmed | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_short | Cybersecurity and Identity Access Management |
title_sort | cybersecurity and identity access management |
topic | Telecommunication Computer networks Security measures Criminology Data protection |
topic_facet | Telecommunication Computer networks Security measures Criminology Data protection |
url | https://doi.org/10.1007/978-981-19-2658-7 |
work_keys_str_mv | AT rawalbharats cybersecurityandidentityaccessmanagement AT manogarangunasekaran cybersecurityandidentityaccessmanagement AT peteralexender cybersecurityandidentityaccessmanagement |