Mastering Cybersecurity Strategies, Technologies, and Best Practices

Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its p...

Full description

Bibliographic Details
Main Author: Edwards, Dr. Jason
Format: eBook
Language:English
Published: Berkeley, CA Apress 2024, 2024
Edition:1st ed. 2024
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Chapter 1: Threat Landscape
  • Chapter 2: Types of Cyber Attacks
  • Chapter 3: Social Engineering
  • Chapter 4: Cryptography
  • Chapter 5: Network Security
  • Chapter 6: Web Application Security
  • Chapter 7: Mobile Security.-Chapter 8: Cloud Security
  • Chapter 9: IoT Security
  • Chapter 10: Digital Forensics
  • Chapter 11: Vulnerability Assessment and Penetration Testing
  • Chapter 12: Security Policies and Procedures
  • Chapter 13: Data Privacy and Protection
  • Chapter 14: Insider Threats