The KCAU Library

Image from Google Jackets

Advanced cybersecurity technologies / Dr. Ralph Moseley.

By: Material type: TextTextPublication details: Boca Raton : CRC Press, 2022.Edition: First editionDescription: xix, 204 pages : illustrations ; 23 cmISBN:
  • 9780367562328
Subject(s): LOC classification:
  • QA76.9.A25 M6735 2022
Summary: "Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally"--
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Vol info Status Date due Barcode
Main Short Main Short Martin Oduor-Otieno Library This item is located on the library ground floor Non-fiction QA76.9.A25 M6735 2022 (Browse shelf(Opens below)) 31473/23 Checked out 14/05/2024 MOOL23090118
Main Short Main Short Martin Oduor-Otieno Library This item is located on the library ground floor Non-fiction QA76.9.A25 M6735 2022 (Browse shelf(Opens below)) 31503/23 Available MOOL23090117
Browsing Martin Oduor-Otieno Library shelves, Shelving location: This item is located on the library ground floor, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA76.9.A25 C924 2019 Cybersecurity : insights you need from Harvard Business Review / QA 76.9 A25 .K315 2015 Introduction to modern cryptography / QA76.9.A25 K5993 2023. Ethical and secure computing : a concise module / QA76.9.A25 M6735 2022 Advanced cybersecurity technologies / QA76.9.A25 M6735 2022 Advanced cybersecurity technologies / QA76.9.A25 P5965 2015 Hacking and penetration testing with low power devices / QA76.9.A25 S6556 2011 Computer forensics jumpstart /

Includes bibliographical references and index.

"Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally"--

There are no comments on this title.

to post a comment.
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links

Powered by Koha