Little Book of Cybersecurity e-bog
35,47 DKK
(inkl. moms 44,34 DKK)
Many people believe that cybersecurity is a complicated and complex subject that involves computer security, information assurance, comprehensive infrastructure protection, commercial integrity, and ubiquitous personal interaction. The concepts apply to information, computers, networks, and other elements of coordination, cooperation, and control and involve government, business, education, an...
E-bog
35,47 DKK
Forlag
iUniverse
Udgivet
23 marts 2022
Længde
316 sider
Genrer
Teaching of a specific subject
Sprog
English
Format
epub
Beskyttelse
LCP
ISBN
9781663237781
Many people believe that cybersecurity is a complicated and complex subject that involves computer security, information assurance, comprehensive infrastructure protection, commercial integrity, and ubiquitous personal interaction. The concepts apply to information, computers, networks, and other elements of coordination, cooperation, and control and involve government, business, education, and the day-to-day lives of private individuals. The concerns normally involve the Internet as a communication facility - hence the name Cybersecurity. Achieving and maintaining cybersecurity is a never-ending process, much like national security, bank security, and so forth, so it is important to know the essential foundations of how to manage the risks of using technical interactions in order to obtain the inherent benefit. Some of the concerns that immediately come to mind are identity, personal privacy, intellectual property, secure maintenance of the critical infrastructure, and the continued operation of necessary organizations. There is a plethora of printed and online literature on various aspects of Cybersecurity - including computer security, information assurance, infrastructure security, personal security, and associated government policy informations. The purpose of this book is to give a composite picture of what Cybersecurity is all about, identify the important literature of the subject, and describe how it differs from everyday information security affecting individuals and computer activities. This book requires knowledge of basic information systems, computer technology, and network security considerations for an understanding of the implications or many of the topics. No knowledge of mathematics, physics, and engineering is required. The author, Harry Katzan Jr., has spent many years in basic computer security, cryptography, and modern methods including artificial intelligence and advanced software development. He is the author of Computer Data Security, The Standard Data Encryption Algorithm, and Privacy, Identity and Cloud Computing, and has done development work on security for a major bank.