Network and Data Security for Non-Engineers Front Cover

Network and Data Security for Non-Engineers

  • Length: 273 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2016-08-24
  • ISBN-10: 1498767869
  • ISBN-13: 9781498767866
  • Sales Rank: #1080764 (See Top 100 Books)
Description

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Table of Contents

Chapter 1: Introduction To Security Threats
Chapter 2: The 2014–2015 Anthem Blue Cross And Blue Shield Break-In Case Study
Chapter 3: Anonymous Persistent Threats
Chapter 4: Creating Secure Code
Chapter 5: Providing A Secure Architecture
Chapter 6: The Hacker Strategy: Expanded
Chapter 7: Malware, Viruses, Worms, Bugs, And Botnets
Chapter 8: Cryptography And The Rsa Algorithm
Chapter 9: Browser Security And Cross-Site Scripting
Chapter 10: Banking Security, Zeus, And Spyeye
Chapter 11: Web Application Security
Chapter 12: Session Management, User Authentication, And Web Application Security
Chapter 13: Web Security, Dns Security, And The Internet
Chapter 14: Network Security And Defenses
Chapter 15: Network Security Protocols And Defensive Mechanisms
Chapter 16: Denial-Of-Service Attacks
Chapter 17: Mobile Platform Security
Chapter 18: Cellular Access Security: 4G Lte, Mobile Wimax, 5G, And Mimos
Chapter 19: Wireless Lan Security
Chapter 20: The Stuxnet Worm And The Vulnerability Of The Us Electric Power Grid
Chapter 21: Cyber Warfare
Chapter 22: Conclusion

To access the link, solve the captcha.