Cybersecurity and Identity Access Management

This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The boo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rawal, Bharat S. (VerfasserIn), Manogaran, Gunasekaran (VerfasserIn), Peter, Alexender (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Singapore Springer Nature Singapore 2023
Ausgabe:1st ed. 2023
Schlagworte:
Online-Zugang:DE-1043
DE-91
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV049646391
003 DE-604
005 20240424
007 cr|uuu---uuuuu
008 240411s2023 xx a||| o|||| 00||| eng d
020 |a 9789811926587  |9 978-981-1926-58-7 
024 7 |a 10.1007/978-981-19-2658-7  |2 doi 
035 |a (ZDB-2-ENG)978-981-19-2658-7 
035 |a (OCoLC)1430760280 
035 |a (DE-599)BVBBV049646391 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-1043 
082 0 |a 621.382 
100 1 |a Rawal, Bharat S.  |e Verfasser  |4 aut 
245 1 0 |a Cybersecurity and Identity Access Management  |c by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter 
250 |a 1st ed. 2023 
264 1 |a Singapore  |b Springer Nature Singapore  |c 2023 
300 |a 1 Online-Ressource (X, 236 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls 
520 |a This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. 
650 4 |a Telecommunication 
650 4 |a Computer networks  |x Security measures 
650 4 |a Criminology 
650 4 |a Data protection 
700 1 |a Manogaran, Gunasekaran  |e Verfasser  |4 aut 
700 1 |a Peter, Alexender  |e Verfasser  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9789811926570 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9789811926594 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9789811926600 
856 4 0 |u https://doi.org/10.1007/978-981-19-2658-7  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-ENG 
912 |a ZDB-2-SXE 
940 1 |q ZDB-2-ENG_2023 
943 1 |a oai:aleph.bib-bvb.de:BVB01-034989913 
966 e |u https://doi.org/10.1007/978-981-19-2658-7  |l DE-1043  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-19-2658-7  |l DE-91  |p ZDB-2-ENG  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2790116
_version_ 1820807733975187456
any_adam_object
author Rawal, Bharat S.
Manogaran, Gunasekaran
Peter, Alexender
author_facet Rawal, Bharat S.
Manogaran, Gunasekaran
Peter, Alexender
author_role aut
aut
aut
author_sort Rawal, Bharat S.
author_variant b s r bs bsr
g m gm
a p ap
building Verbundindex
bvnumber BV049646391
collection ZDB-2-ENG
ZDB-2-SXE
ctrlnum (ZDB-2-ENG)978-981-19-2658-7
(OCoLC)1430760280
(DE-599)BVBBV049646391
dewey-full 621.382
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 621 - Applied physics
dewey-raw 621.382
dewey-search 621.382
dewey-sort 3621.382
dewey-tens 620 - Engineering and allied operations
discipline Elektrotechnik / Elektronik / Nachrichtentechnik
doi_str_mv 10.1007/978-981-19-2658-7
edition 1st ed. 2023
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03279nam a2200505zc 4500</leader><controlfield tag="001">BV049646391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240424 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2023 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811926587</subfield><subfield code="9">978-981-1926-58-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-2658-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-981-19-2658-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430760280</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049646391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-1043</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rawal, Bharat S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and Identity Access Management</subfield><subfield code="c">by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 236 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manogaran, Gunasekaran</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peter, Alexender</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926570</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926594</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926600</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SXE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2023</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034989913</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049646391
illustrated Illustrated
indexdate 2024-12-24T10:12:00Z
institution BVB
isbn 9789811926587
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034989913
oclc_num 1430760280
open_access_boolean
owner DE-91
DE-BY-TUM
DE-1043
owner_facet DE-91
DE-BY-TUM
DE-1043
physical 1 Online-Ressource (X, 236 Seiten) Illustrationen
psigel ZDB-2-ENG
ZDB-2-SXE
ZDB-2-ENG_2023
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher Springer Nature Singapore
record_format marc
spellingShingle Rawal, Bharat S.
Manogaran, Gunasekaran
Peter, Alexender
Cybersecurity and Identity Access Management
Telecommunication
Computer networks Security measures
Criminology
Data protection
title Cybersecurity and Identity Access Management
title_auth Cybersecurity and Identity Access Management
title_exact_search Cybersecurity and Identity Access Management
title_full Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
title_fullStr Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
title_full_unstemmed Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
title_short Cybersecurity and Identity Access Management
title_sort cybersecurity and identity access management
topic Telecommunication
Computer networks Security measures
Criminology
Data protection
topic_facet Telecommunication
Computer networks Security measures
Criminology
Data protection
url https://doi.org/10.1007/978-981-19-2658-7
work_keys_str_mv AT rawalbharats cybersecurityandidentityaccessmanagement
AT manogarangunasekaran cybersecurityandidentityaccessmanagement
AT peteralexender cybersecurityandidentityaccessmanagement