000 | 04209cam a2200601Ii 4500 | ||
---|---|---|---|
001 | 9781003124030 | ||
003 | FlBoTFG | ||
005 | 20220724194447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 201201s2021 flu o 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9781000298611 _q(electronic bk.) |
||
020 |
_a1000298612 _q(electronic bk.) |
||
020 | _z9780367642785 | ||
020 | _z0367642786 | ||
020 | _a9781000298673 | ||
020 | _a1000298671 | ||
020 |
_a9781000298642 _q(Mobipocket ebook) |
||
020 | _a1000298647 | ||
020 |
_a9781003124030 _q(ebook) |
||
020 | _a1003124038 | ||
024 | 7 |
_a10.1201/9781003124030 _2doi |
|
035 |
_a(OCoLC)1224862228 _z(OCoLC)1201179827 _z(OCoLC)1202463565 _z(OCoLC)1203944089 _z(OCoLC)1225552248 |
||
035 | _a(OCoLC-P)1224862228 | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x012040 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x015000 _2bisacsh |
|
072 | 7 |
_aUGC _2bicssc |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aSkillicorn, David B., _eauthor. |
|
245 | 1 | 0 |
_aCybersecurity for everyone / _cDavid B. Skillicorn. |
264 | 1 |
_aBoca Raton : _bCRC Press, _c2021. |
|
264 | 4 | _c©2021 | |
300 | _a1 online resource (viii, 94 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aCRC focus | |
500 | _aIncludes index. | ||
505 | 0 | _aCover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- 1. Introduction -- 2. How cyberspace works -- 2.1. Encounters with cyberspace -- 2.2. What is cyberspace? -- 2.3. Nodes -- 2.4. People -- 2.5. Pipes -- 2.6. Configuration -- 2.7. Types of traffic -- 2.8. The Deep Web -- 2.9. The Dark Web -- 2.10. The World Wide Web -- 2.11. Social aspects -- 2.12. Governance -- 2.13. Security issues -- 2.14. Non-benign use of cyberspace -- 3. Encryption and hashing -- 3.1. Private key encryption -- 3.2. Public key encryption -- 3.3. Digital signing and digital hashing | |
505 | 8 | _a3.4. Encryption in use -- 4. Node security -- 4.1. Getting access to nodes -- 4.2. Malware -- 4.3. What does malware do? -- 4.4. Direct attacks -- 5. Pipe security -- 5.1. IP -- 5.2. TCP -- 5.3. UDP -- 5.4. Attacks leveraging protocols -- 5.5. Countermeasures -- 6. Configuration security -- 6.1. Internet Control Message Protocol -- 6.2. Domain Name Service -- 6.3. Switch vulnerabilities -- 6.4. Mounting an attack -- 6.5. Defending against attacks -- 6.6. Recovery -- 7. Application security -- 7.1. Email -- 7.2. Web traffic -- 7.3. Blockchains -- 8. Summary -- Index | |
520 | _aCyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 | _aComputer security. | |
650 | 7 |
_aCOMPUTERS / Computer Graphics / Game Programming & Design _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Computer Science _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Security / Viruses _2bisacsh |
|
856 | 4 | 0 |
_3Read Online _uhttps://www.taylorfrancis.com/books/9781003124030 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 |
_2lcc _cEBK |
||
999 |
_c17858 _d17858 |