Fr. 76.00

Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools

Anglais · Livre de poche

Expédition généralement dans un délai de 1 à 3 semaines (ne peut pas être livré de suite)

Description

En savoir plus










Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too

Table des matières

1. Cybersecurity Technologies Classification 2. Encryption 3. Authentication 4. Biometrics 5. Firewall Technologies 6. Virus Detection 7. Phishing Detection 8. Endpoint Protection 9. Malware Protection Technology 10. The Internet of Things (IoT) 11. Network Security 12. Location Tracking 13. Surveillance 14. Insider Threat Protection 15. Intrusion Detection 16. Vulnerability Scanning 17. Penetration Testing 18. Conclusion

A propos de l'auteur

Dr. Abbas Moallem is a consultant and adjunct professor at San Jose State University, California where he teaches human-computer interaction, cybersecurity, information visualization and human factors. He is the program chair of HCI-CPT, the International Conference on HCI for Cybersecurity, Privacy and Trust.
Dr. Moallem is the editor of "HCI in cybersecurity Handbook" and the author of "Cybersecurity Awareness Among College Students and Faculty". He is also the editor of a book series from CRC PRESS called "The Human Element in Smart and Intelligent Systems Series".

Résumé

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.