Target New ArrivalsGift Ideas for MomClothing, Shoes & AccessoriesHome & DecorKitchen & DiningOutdoor Living & GardenGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessLuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsSpring OutfitsGift Ideas for MomWomen’s Festival OutfitsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Discovering Cybersecurity - by  Seth James Nielson (Paperback) - 1 of 1

Discovering Cybersecurity - by Seth James Nielson (Paperback)

$35.64Save $19.35 (35% off)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges.
  • About the Author: Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company.
  • 443 Pages
  • Computers + Internet, Security

Description



Book Synopsis



The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission.

This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

What You Will Learn

  • Authentication technologies, including secure password storage and how hackers "crack" password lists
  • Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
  • Core cryptography technology, including AES encryption and public key signatures
  • Classical host security technologies that protect against malware (viruses, trojans, ransomware)
  • Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
  • Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
  • Email and social media security threats such as spam, phishing, social media, and other email threats

Who This Book Is For

Professionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.



From the Back Cover



The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission.

This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.

What You Will Learn

  • Authentication technologies, including secure password storage and how hackers "crack" password lists
  • Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
  • Core cryptography technology, including AES encryption and public key signatures
  • Classical host security technologies that protect against malware (viruses, trojans, ransomware)
  • Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
  • Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
  • Email and social media security threats such as spam, phishing, social media, and other email threats



About the Author



Seth James Nielson, PhD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python.
Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .93 Inches (D)
Weight: 1.41 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 443
Genre: Computers + Internet
Sub-Genre: Security
Publisher: Apress
Theme: General
Format: Paperback
Author: Seth James Nielson
Language: English
Street Date: December 9, 2023
TCIN: 1006748427
UPC: 9781484295595
Item Number (DPCI): 247-24-0988
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.93 inches length x 6.14 inches width x 9.21 inches height
Estimated ship weight: 1.41 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: What key topics are covered in the book?

submitted by AI Shopping Assistant - 1 month ago
  • A: Key topics include authentication technologies, access control, cryptography, malware protection, and web security.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What is the primary audience for this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book targets professionals without technical backgrounds, including policy makers, compliance teams, and business executives.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: Who is the author of this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The author is Seth James Nielson, PhD, founder of Crimson Vista, a cybersecurity engineering company.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What will readers learn from this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: Readers will learn about various cybersecurity technologies and how they function, helping them interact effectively with security professionals.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: Is this book suitable for beginners in cybersecurity?

submitted by AI Shopping Assistant - 1 month ago
  • A: Yes, it is designed for beginners and non-technical professionals looking to understand cybersecurity concepts.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Additional product information and recommendations

Discover more options

Frequently bought together

Trending Computers & Technology Books

Get top deals, latest trends, and more.

Privacy policy