Fr. 77.00

Attack Vectors - The History of Cybersecurity

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You'll Learn:

  • Understand the history of cyber-security from the early 1950's through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

Sommario

Chapter 1: The History of Attack Vectors.- Chapter 2: Business Justification.- Chapter 3: Definitions.- Chapter 4: Malware.- Chapter 5: Exploits.- Chapter 6: Breaches.- Chapter 7: Regulations.- Chapter 8: People.- Chapter 9: Syndicates.- Chapter 10: Social Engineering.- Chapter 11: Solutions.- Chapter 12: The Human Threat.- Chapter 13:  Lateral Movement.- Chapter 14: Return on Investment.- Chapter 15: It s Not If, But When.- Chapter 16: Supply Chain Attacks.- Chapter 17: Been Hacked?.- Chapter 18: History Lesson.- Chapter 19: Conclusion.

Info autore

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previous served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during nearly his 13-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Riassunto

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You’ll Learn:

  • Understand the history of cyber-security from the early 1950’s through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

Dettagli sul prodotto

Autori Morey Haber
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 27.10.2025
 
EAN 9798868817083
ISBN 9798868817083
Pagine 384
Dimensioni 155 mm x 22 mm x 235 mm
Peso 634 g
Illustrazioni XXXVI, 384 p. 15 illus.
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Technikgeschichte, Datenschutz, Netzwerksicherheit, Privacy, Exploits, Cybersecurity, Malware, Data and Information Security, Informatik und Informationstechnologie, Cyber Attack, data security, Information Security, Cyber Defense, cyber attack vectors, cyber breach, attack vectors, cyber threat

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.