Limit search to available items
534 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author Moseley, Ralph

Title Advanced Cybersecurity Technologies
Published Milton : Taylor & Francis Group, 2021

Copies

Description 1 online resource (225 p.)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Biography -- Abbreviations and Acronyms -- Chapter 1 Introduction -- Chapter 2 Web and network basics -- Networks -- Application layer -- Presentation layer -- Session layer -- Transport layer -- Network layer -- Data link layer -- Physical layer -- How the OSI model works -- TCP/IP model -- Application layer -- Transport layer -- Internet layer -- Link layer -- Protocols and ports -- UDP and TCP -- Web specifics -- HTTP -- HTTP resources -- HTTP connections -- Conversations with a server -- UPnP
Remote access protocols -- SSH -- Suggested projects and experiments -- Deploy Apache -- Deploy a Droplet or virtual server -- References -- Chapter 3 Cryptography -- Why we need cryptography -- Classical cryptography -- Substitution ciphers -- Frequency analysis -- Caesar cipher -- Vigenere cipher -- The one-time pad -- Modern algorithms -- Practical encryption engineering -- Encryption in Node​.​js -- Hashes -- Python cryptography -- Steganography -- Terminology and basics -- Images -- Audio encryption -- Least significant bit (LSB) coding -- Phase encoding -- Spread spectrum -- Parity encoding
Echo hiding -- DeepSound -- Using stenography practically -- Digital watermarking -- Suggested projects -- Chapter 4 Hacking overview -- Case histories -- a context and background of hacks and hacker's motivations -- Worms -- Viruses -- Deception -- File replication -- Trojan -- Botnets -- DDoS -- Motivations behind malware -- History -- Case history: Stuxnet -- Case history: Michael Calce (Aka MafiaBoy) -- Case history: Jonathan James -- Case history: Gary McKinnon -- Case history: Lauri Love -- Huawei -- Techniques -- Spoofing email -- the basis of phishing attack -- Bots and automated mechanisms
Protocols -- Tests -- Resistance to social engineering -- Waste handling -- General advice -- Software protection -- Intelligence and research used for social engineering -- Sources -- Search engines -- Google Alerts -- Google/Bing images -- Using web archives -- Social media -- Specialized search engines -- Media -- documents, photographs, video -- Telephone numbers and addresses -- Online tracing with IP addresses and presence -- Conclusions -- References -- Chapter 7 Cyber countermeasures -- Introduction -- Training -- Firewalls -- Linux -- Cloud -- Shields -- Malware detection -- Websites
Notes Description based upon print version of record
Bibliography References -- Chapter 5 Packet analysis and penetration testing -- Packet sniffing -- Wireshark -- Modifying Wireshark -- Analysis with Wireshark -- Analyzing malware - Trickbot -- Conclusion -- Suggested projects -- Chapter 6 Social engineering -- Phishing -- Spear phishing -- Vishing -- Smishing -- Pretexting -- Water holing -- Baiting -- Quid Pro Quo -- Tailgating -- Scareware -- Other varieties -- Social engineering process -- Research -- Engagement -- The attack -- The conclusion -- Social engineering countermeasures -- Training -- Frameworks and protocols -- Categorizing information
Notes Antivirus
Subject Computer security.
Computer networks -- Security measures.
Cyberspace -- Security measures.
Computer networks -- Security measures
Computer security
Cyberspace -- Security measures
Form Electronic book
ISBN 9781000514575
1000514579