000 04209cam a2200601Ii 4500
001 9781003124030
003 FlBoTFG
005 20220724194447.0
006 m o d
007 cr cnu---unuuu
008 201201s2021 flu o 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781000298611
_q(electronic bk.)
020 _a1000298612
_q(electronic bk.)
020 _z9780367642785
020 _z0367642786
020 _a9781000298673
020 _a1000298671
020 _a9781000298642
_q(Mobipocket ebook)
020 _a1000298647
020 _a9781003124030
_q(ebook)
020 _a1003124038
024 7 _a10.1201/9781003124030
_2doi
035 _a(OCoLC)1224862228
_z(OCoLC)1201179827
_z(OCoLC)1202463565
_z(OCoLC)1203944089
_z(OCoLC)1225552248
035 _a(OCoLC-P)1224862228
050 4 _aQA76.9.A25
072 7 _aCOM
_x012040
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x015000
_2bisacsh
072 7 _aUGC
_2bicssc
082 0 4 _a005.8
_223
100 1 _aSkillicorn, David B.,
_eauthor.
245 1 0 _aCybersecurity for everyone /
_cDavid B. Skillicorn.
264 1 _aBoca Raton :
_bCRC Press,
_c2021.
264 4 _c©2021
300 _a1 online resource (viii, 94 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aCRC focus
500 _aIncludes index.
505 0 _aCover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- 1. Introduction -- 2. How cyberspace works -- 2.1. Encounters with cyberspace -- 2.2. What is cyberspace? -- 2.3. Nodes -- 2.4. People -- 2.5. Pipes -- 2.6. Configuration -- 2.7. Types of traffic -- 2.8. The Deep Web -- 2.9. The Dark Web -- 2.10. The World Wide Web -- 2.11. Social aspects -- 2.12. Governance -- 2.13. Security issues -- 2.14. Non-benign use of cyberspace -- 3. Encryption and hashing -- 3.1. Private key encryption -- 3.2. Public key encryption -- 3.3. Digital signing and digital hashing
505 8 _a3.4. Encryption in use -- 4. Node security -- 4.1. Getting access to nodes -- 4.2. Malware -- 4.3. What does malware do? -- 4.4. Direct attacks -- 5. Pipe security -- 5.1. IP -- 5.2. TCP -- 5.3. UDP -- 5.4. Attacks leveraging protocols -- 5.5. Countermeasures -- 6. Configuration security -- 6.1. Internet Control Message Protocol -- 6.2. Domain Name Service -- 6.3. Switch vulnerabilities -- 6.4. Mounting an attack -- 6.5. Defending against attacks -- 6.6. Recovery -- 7. Application security -- 7.1. Email -- 7.2. Web traffic -- 7.3. Blockchains -- 8. Summary -- Index
520 _aCyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 7 _aCOMPUTERS / Computer Graphics / Game Programming & Design
_2bisacsh
650 7 _aCOMPUTERS / Computer Science
_2bisacsh
650 7 _aCOMPUTERS / Security / Viruses
_2bisacsh
856 4 0 _3Read Online
_uhttps://www.taylorfrancis.com/books/9781003124030
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _2lcc
_cEBK
999 _c17858
_d17858