Network and Data Security for Non-Engineers

Book Description

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden , download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Table of Contents

Chapter 1: Introduction To Security Threats
Chapter 2: The 2014–2015 Anthem Blue Cross And Blue Shield Break-In Case Study
Chapter 3: Anonymous Persistent Threats
Chapter 4: Creating Secure Code
Chapter 5: Providing A Secure
Chapter 6: The Strategy: Expanded
Chapter 7: Malware, Viruses, Worms, Bugs, And Botnets
Chapter 8: Cryptography And The Rsa Algorithm
Chapter 9: Browser Security And Cross-Site Scripting
Chapter 10: Banking Security, Zeus, And Spyeye
Chapter 11: Web Application Security
Chapter 12: Session Management, User Authentication, And Web Application Security
Chapter 13: Web Security, Dns Security, And The Internet
Chapter 14: Network Security And Defenses
Chapter 15: Network Security Protocols And Defensive Mechanisms
Chapter 16: Denial-Of-Service Attacks
Chapter 17: Mobile Platform Security
Chapter 18: Cellular Access Security: 4G , Mobile Wimax, 5G, And Mimos
Chapter 19: Wireless Lan Security
Chapter 20: The Stuxnet Worm And The Of The Us Electric Power Grid
Chapter 21: Cyber Warfare
Chapter 22: Conclusion

Book Details

Book Link

Download LinkFormatSize (MB)Upload Date
Download from UsersCloudTrue PDF9.303/19/2018
How to Download? Report Dead Links & Get a Copy