Fr. 76.00

Attack Vectors - The History of Cybersecurity

Anglais · Livre de poche

Expédition généralement dans un délai de 6 à 7 semaines

Description

En savoir plus

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You'll Learn:

  • Understand the history of cyber-security from the early 1950's through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

Table des matières

Chapter 1: The History of Attack Vectors.- Chapter 2: Business Justification.- Chapter 3: Definitions.- Chapter 4: Malware.- Chapter 5: Exploits.- Chapter 6: Breaches.- Chapter 7: Regulations.- Chapter 8: People.- Chapter 9: Syndicates.- Chapter 10: Social Engineering.- Chapter 11: Solutions.- Chapter 12: The Human Threat.- Chapter 13:  Lateral Movement.- Chapter 14: Return on Investment.- Chapter 15: It s Not If, But When.- Chapter 16: Supply Chain Attacks.- Chapter 17: Been Hacked?.- Chapter 18: History Lesson.- Chapter 19: Conclusion.

A propos de l'auteur

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previous served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during nearly his 13-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Résumé

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You’ll Learn:

  • Understand the history of cyber-security from the early 1950’s through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

Détails du produit

Auteurs Morey Haber
Edition Springer, Berlin
 
Langues Anglais
Format d'édition Livre de poche
Sortie 27.10.2025
 
EAN 9798868817083
ISBN 9798868817083
Pages 384
Dimensions 155 mm x 22 mm x 235 mm
Poids 634 g
Illustrations XXXVII, 384 p. 15 illus.
Catégories Sciences naturelles, médecine, informatique, technique > Informatique, ordinateurs > Informatique

Technikgeschichte, Datenschutz, Netzwerksicherheit, Privacy, Exploits, Cybersecurity, Malware, Data and Information Security, Informatik und Informationstechnologie, Cyber Attack, data security, Information Security, Cyber Defense, cyber attack vectors, cyber breach, attack vectors, cyber threat

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.