Cybersecurity and Identity Access Management:
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The boo...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2023
|
Ausgabe: | 1st ed. 2023 |
Schlagworte: | |
Online-Zugang: | DE-1043 DE-91 Volltext |
Zusammenfassung: | This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. |
Beschreibung: | Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls |
Beschreibung: | 1 Online-Ressource (X, 236 Seiten) Illustrationen |
ISBN: | 9789811926587 |
DOI: | 10.1007/978-981-19-2658-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049646391 | ||
003 | DE-604 | ||
005 | 20240424 | ||
007 | cr|uuu---uuuuu | ||
008 | 240411s2023 |||| o||u| ||||||eng d | ||
020 | |a 9789811926587 |9 978-981-1926-58-7 | ||
024 | 7 | |a 10.1007/978-981-19-2658-7 |2 doi | |
035 | |a (ZDB-2-ENG)978-981-19-2658-7 | ||
035 | |a (OCoLC)1430760280 | ||
035 | |a (DE-599)BVBBV049646391 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-1043 | ||
082 | 0 | |a 621.382 | |
100 | 1 | |a Rawal, Bharat S. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity and Identity Access Management |c by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2023 | |
300 | |a 1 Online-Ressource (X, 236 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls | ||
520 | |a This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. | ||
650 | 4 | |a Telecommunication | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Criminology | |
650 | 4 | |a Data protection | |
700 | 1 | |a Manogaran, Gunasekaran |e Verfasser |4 aut | |
700 | 1 | |a Peter, Alexender |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926570 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926594 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9789811926600 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-19-2658-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG |a ZDB-2-SXE | ||
940 | 1 | |q ZDB-2-ENG_2023 | |
966 | e | |u https://doi.org/10.1007/978-981-19-2658-7 |l DE-1043 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-2658-7 |l DE-91 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805071417266405376 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender |
author_facet | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender |
author_role | aut aut aut |
author_sort | Rawal, Bharat S. |
author_variant | b s r bs bsr g m gm a p ap |
building | Verbundindex |
bvnumber | BV049646391 |
collection | ZDB-2-ENG ZDB-2-SXE |
ctrlnum | (ZDB-2-ENG)978-981-19-2658-7 (OCoLC)1430760280 (DE-599)BVBBV049646391 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-981-19-2658-7 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049646391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240424</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811926587</subfield><subfield code="9">978-981-1926-58-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-2658-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-981-19-2658-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430760280</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049646391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-1043</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rawal, Bharat S.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and Identity Access Management</subfield><subfield code="c">by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 236 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manogaran, Gunasekaran</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peter, Alexender</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926570</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926594</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9789811926600</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield><subfield code="a">ZDB-2-SXE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2023</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-2658-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049646391 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:39:53Z |
indexdate | 2024-07-20T04:37:29Z |
institution | BVB |
isbn | 9789811926587 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034989913 |
oclc_num | 1430760280 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-1043 |
owner_facet | DE-91 DE-BY-TUM DE-1043 |
physical | 1 Online-Ressource (X, 236 Seiten) Illustrationen |
psigel | ZDB-2-ENG ZDB-2-SXE ZDB-2-ENG_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer Nature Singapore |
record_format | marc |
spelling | Rawal, Bharat S. Verfasser aut Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter 1st ed. 2023 Singapore Springer Nature Singapore 2023 1 Online-Ressource (X, 236 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. Telecommunication Computer networks Security measures Criminology Data protection Manogaran, Gunasekaran Verfasser aut Peter, Alexender Verfasser aut Erscheint auch als Druck-Ausgabe 9789811926570 Erscheint auch als Druck-Ausgabe 9789811926594 Erscheint auch als Druck-Ausgabe 9789811926600 https://doi.org/10.1007/978-981-19-2658-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Rawal, Bharat S. Manogaran, Gunasekaran Peter, Alexender Cybersecurity and Identity Access Management Telecommunication Computer networks Security measures Criminology Data protection |
title | Cybersecurity and Identity Access Management |
title_auth | Cybersecurity and Identity Access Management |
title_exact_search | Cybersecurity and Identity Access Management |
title_exact_search_txtP | Cybersecurity and Identity Access Management |
title_full | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_fullStr | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_full_unstemmed | Cybersecurity and Identity Access Management by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter |
title_short | Cybersecurity and Identity Access Management |
title_sort | cybersecurity and identity access management |
topic | Telecommunication Computer networks Security measures Criminology Data protection |
topic_facet | Telecommunication Computer networks Security measures Criminology Data protection |
url | https://doi.org/10.1007/978-981-19-2658-7 |
work_keys_str_mv | AT rawalbharats cybersecurityandidentityaccessmanagement AT manogarangunasekaran cybersecurityandidentityaccessmanagement AT peteralexender cybersecurityandidentityaccessmanagement |