Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Verfasst von:Grubb, Sam [VerfasserIn]   i
Titel:How Cybersecurity Really Works
Institutionen:Safari, an O’Reilly Media Company. [MitwirkendeR]   i
Verf.angabe:Grubb, Sam
Ausgabe:1st edition
Verlagsort:[Erscheinungsort nicht ermittelbar]
Verlag:No Starch Press
Jahr:2021
Umfang:1 online resource (216 pages)
Fussnoten:Online resource; Title from title page (viewed June 8, 2021)
Abstract:You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them. Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you’ve gained into cyber-savvy skills that will make you safer at work and at home. You’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps. You’ll also learn how to: •Use command-line tools to see information about your computer and network •Analyze email headers to detect phishing attempts •Open potentially malicious documents in a sandbox to safely see what they do •Set up your operating system accounts, firewalls, and router to protect your network •Perform a SQL injection attack by targeting an intentionally vulnerable website •Encrypt and hash your files In addition, you’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.
ComputerInfo:Mode of access: World Wide Web.
URL:Aggregator: https://learning.oreilly.com/library/view/-/9781098128999/?ar
Datenträger:Online-Ressource
Sprache:eng
Sach-SW:Electronic books ; local
K10plus-PPN:1760397563
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m3938111887
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68748121   QR-Code
zum Seitenanfang