دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Abbas Moallem
سری: The human element in smart and intelligent systems
ISBN (شابک) : 9780367457457, 1032157844
ناشر: CRC Press
سال نشر: 2022
تعداد صفحات: 225
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 7 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب آشنایی با فناوریهای امنیت سایبری: راهنمای انتخاب ابزارهای مناسب امنیت سایبری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Half Title Series Page Title Page Copyright Page Contents Acknowledgments Introduction Author List of Figures Chapter 1: Cybersecurity Technologies Classification 1.1. Introduction 1.2. Different Categories of Cyber Technologies 1.3. Technology Classification Chapter 2: Encryption 2.1. Introduction 2.2. Brief Historical Background 2.3. How Encryption Technologies Work 2.4. Encryption Technologies 2.4.1. RSA (Rivest-Shamir-Adleman) 2.4.2. Blowfish Cipher 2.4.3. Data Encryption Standard (Des) 2.4.4. Triple Des (3Des or Tdes) 2.4.5. Twofish 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption 2.5.1. Advantages 2.5.1.1. RSA 2.5.1.2. Blowfish 2.5.2. Disadvantages 2.5.2.1. RSA 2.5.2.2. Blowfish 2.6. Which Products Use Encryptions 2.6.1. Products Using Blowfish 2.6.2. Products Using RSA 2.7. Conclusion Chapter 3: Authentication 3.1. Introduction 3.2. Brief Historical Background 3.3. How Authentication Technologies Work 3.3.1. Secret Knowledge-Based Authentication 3.3.1.1. Personal Identification Number (PIN) and Password 3.3.1.2. Cognitive Knowledge Question 3.3.1.3. Pattern and Graphical Password 3.3.2. Token-Based Approach 3.3.3. Biometrics 3.3.4. Compound Authentication 3.3.5. Storing Passwords and Usernames 3.4. Authentication Technologies 3.5. Advantages and Disadvantages of Authentication Technoglogies 3.5.1. Advantages 3.5.1.1. Personal Identification Number (PIN) and Password Approach 3.5.1.2. Cognitive Knowledge Question (CKQ) 3.5.1.3. Pattern and Graphical Password 3.5.1.4. Token-Based Passwords 3.5.1.5. Biometric Authentication 3.5.1.6. Compound Authentication 3.5.2. Disadvantages 3.5.2.1. Personal Identification Number (PIN) and Password Approach 3.5.2.2. Cognitive Knowledge Question 3.5.2.3. Pattern and Graphical Passwords 3.5.2.4. Token-Based One-Time Passwords (OTP) 3.5.2.5. Biometric Authentication 3.5.2.6. Compound Authentication 3.6. What Products Use Authentications 3.7. Conclusion Chapter 4: Biometrics 4.1. Introduction 4.2. Brief Historical Background 4.3. How Biometric Technologies Work 4.3.1. Palm 4.3.2. Fingerprints 4.3.2.1. Optical Scanners 4.3.2.2. Capacitive Scanners 4.3.2.3. Ultrasonic Scanners 4.3.3. Face 4.3.4. IRIS 4.3.5. Voice 4.4. Biometric Technologies 4.5. Biometric Traits Comparison 4.6. Advantages and Disadvantages of Biometric Technologies 4.6.1. Advantages of Using Biometrics 4.6.2. Disadvantages of Using Biometrics 4.7. What Products Use Biometrics 4.7.1. Cars 4.7.2. Banking 4.7.3. Health Care 4.7.4. Food and Beverages 4.7.5. Border Control 4.7.6. Education 4.8. Conclusion Chapter 5: Firewall Technologies 5.1. Introduction 5.2. Brief Historical Background 5.3. How Firewall Technologies Work 5.4. Firewall Technologies 5.4.1. Stateless Firewalls or Packet-Filtering 5.4.2. Stateful Firewalls or Dynamic Packet Inspection 5.4.3. Application Proxy/Proxy Server Firewalls 5.4.4. Cloud Firewalls 5.5. Advantages and Disadvantages of Firewall Technologies 5.5.1. Advantages 5.5.2. Disadvantages 5.6. Conclusion Chapter 6: Virus Detection 6.1. Introduction 6.2. Brief Historical Background 6.3. How Virus Detection Technologies Work 6.3.1. Virus Scanning and Detection Process 6.4. Virus Detection Technologies 6.4.1. Sandbox Detection 6.4.2. Data Mining Techniques 6.4.3. Signature-Based Detection 6.4.4. Heuristic Detection 6.4.5. Real-Time Protection 6.5. Advantages and Disadvantages of Virus Detection Technologies 6.5.1. Advantages 6.5.2. Disadvantages 6.6. Approaches Used in Virus Detection 6.7. Conclusion Chapter 7: Phishing Detection 7.1. Introduction 7.2. Brief Historical Background 7.3. How Phishing Detection Technologies Work 7.4. Phishing Detection Technologies 7.4.1. Visual Similarity-Based Phishing Detection 7.4.2. Blacklist-Based Phishing Detection 7.4.3. Web Crawling-Based Phishing Attack Detection 7.5. Advantages and Disadvantages of Phishing Detection Technologies 7.5.1. Advantages 7.5.1.1. Visual Similarity-Based Phishing Detection 7.5.1.2. Blacklist-Based Phishing Detection 7.5.1.3. Web Crawling-Based Phishing Attack Detection 7.5.2. Disadvantages 7.5.2.1. Visual Similarity-Based Phishing Detection 7.5.2.2. Blacklist-Based Phishing Detection 7.5.2.3. Web Crawling-Based Phishing Attack Detection 7.6. What Products Use Phishing Detection 7.6.1. Blacklist-Based Phishing Detection 7.7. Conclusion Chapter 8: Endpoint Protection 8.1. Introduction 8.2. Brief Historical Background 8.2.1. Traditional Antivirus 8.2.2. Endpoint Detection and Response (Edr) 8.2.3. Next-Generation Antivirus Software (NGAV) 8.2.4. Operating System (OS) Centric Security 8.3. How Endpoint Protection Technologies Work 8.3.1. Antivirus 8.3.1.1. Signature 8.3.1.2. Behavioral Detection 8.3.1.3. Machine Learning 8.3.2. Secure Email Gateways (Segs) 8.4. Endpoint Protection Technologies 8.4.1. Antivirus Solutions 8.4.2. Endpoint Detection and Response 8.4.3. Secure Email Gateways 8.5. Advantages and Disadvantages of Endpoint Protection Technologies 8.5.1. Antivirus Solutions 8.5.1.1. Advantages 8.5.1.2. Disadvantages 8.5.2. Endpoint Detection and Response 8.5.2.1. Advantages 8.5.2.2. Disadvantages 8.5.3. Secure Email Gateways 8.5.3.1. Advantages 8.5.3.2. Disadvantages 8.6. What Products Use Endpoint Protection 8.6.1. Antivirus Solutions 8.6.2. Endpoint Detection and Response 8.6.3. Secure Email Gateways 8.7. Conclusion Chapter 9: Malware Protection Technology 9.1. Introduction 9.2. Brief Historical Background 9.3. How Malware Protection Technologies Work 9.3.1. Heuristic Analysis 9.3.2. Signature-Based Safety 9.3.3. Host-Based Intrusion Prevention Systems 9.4. Malware Protection Technologies 9.4.1. Main Category of Malware Detection Technology 9.4.1.1. Heuristic Analysis 9.4.1.2. Signature-Based Security 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) 9.5. Advantages and Disadvantages of Malware Protection 9.5.1. Advantages 9.5.1.1. Heuristic Analysis 9.5.1.2. Signature-Based Protection 9.5.1.3. Host-Based Intrusion Prevention Systems 9.5.2. Disadvantages 9.5.2.1. Heuristic Analysis 9.5.2.2. Signature-Based Protection 9.5.2.3. Host-Based Intrusion Prevention Systems 9.6. What Products Use Malware Protection 9.7. Conclusion Chapter 10: The Internet of Things (IoT) 10.1. Introduction 10.2. Brief Historical Background 10.3. How IoT Technologies Work 10.3.1. End-to-End Platform 10.3.2. Connectivity Platform 10.3.3. Cloud and Data Platforms 10.4. Iot Security Technologies 10.4.1. Securing IoT Devices 10.4.2. Smart Device Protection Technologies 10.4.2.1. Host Identity Protocol (HIP) 10.4.2.2. Hip Diet Exchange 10.4.2.3. Intrusion Detection and Mitigation Framework 10.4.2.4. Intrusion Detection System 10.4.2.5. Openflow 10.4.2.6. Software-Defined Networking 10.5. Advantages and Disadvantages of IoT Security Technologies 10.5.1. Advantages 10.5.2. Disadvantages 10.6. What Products Use IoT Technologies 10.7. Conclusion Chapter 11: Network Security 11.1. Introduction 11.2. Brief Historical Background 11.3. How Network Security Technologies Work 11.3.1. Firewall 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention 11.3.3. Wi-Fi Protected Access 3 (WPA3) 11.4. Network Security Technologies 11.4.1. Firewalls 11.4.2. Email Security 11.4.3. Antivirus and Antimalware Software 11.4.4. Virtual Private Network (VPN) 11.4.5. Intrusion Prevention Systems (IDS) 11.5. Advantages and Disadvantages of Network Security 11.5.1. Advantages of Network Security 11.5.2. Disadvantages of Network Security 11.6. Which Products Use Network Security 11.6.1. Banks/Financial Institutions 11.6.2. Hospitals/Medical Institutions 11.6.3. Cloud Computing 11.6.4. Use of Network Security Technologies 11.6.5. Firewalls 11.6.6. Antivirus 11.6.7. Security Information and Event Management 11.7. Conclusion Chapter 12: Location Tracking 12.1. Introduction 12.2. Brief Historical Background 12.3. How Location Tracking Technologies Work 12.3.1. Uses of GPS Technology 12.4. Location Tracking Technologies 12.4.1. GPS Technology 12.4.2. Radio Frequency Identification 12.4.3. Internet Tracking 12.4.4. Advantages and Disadvantages of Location Tracking 12.4.4.1. Advantages of Location Tracking 12.4.4.2. Disadvantages of Location Tracking 12.5. Which Products Use Location Tracking 12.6. Conclusion Chapter 13: Surveillance 13.1. Introduction 13.2. Brief Historical Background 13.3. How Surveillance Technology Works 13.3.1. Video Surveillance and Crime 13.4. Surveillance Technologies 13.4.1. Computer 13.4.2. Telephones 13.4.3. Aerial Surveillance 13.5. Advantages and Disadvantages of Surveillance Technologies 13.5.1. Advantages 13.5.2. Disadvantages 13.6. Which Products Use Surveillance 13.7. Conclusion Chapter 14: Insider Threat Protection 14.1. Introduction 14.2. Brief Historical Background 14.3. How Insider Threat Protection Technologies Work 14.4. Insider Threat Detection Technologies 14.4.1. Data Loss Prevention 14.4.2. Email Security Applications 14.4.3. Privileged Access Management (Pam) 14.5. User Activity Monitoring and Behavior Analytics 14.6. Advantages and Disadvantages of Insider Threat Detection 14.6.1. Advantages 14.6.2. Disadvantages 14.7. Conclusion Chapter 15: Intrusion Detection 15.1. Introduction 15.2. Brief Historical Background 15.3. How Intrusion Detection Technologies Work 15.3.1. Network-Based Intrusion Prevention System 15.3.2. Host Intrusion Detection Systems 15.4. Intrusion Detection Technologies 15.5. Advantages and Disadvantages of Intrusion Detection Systems 15.5.1. Advantages 15.5.1.1. Network-Based Intrusion Prevention System 15.5.1.2. Host Intrusion Detection Systems 15.5.2. Disadvantages 15.5.2.1. Network-Based Intrusion Prevention System 15.5.2.2. Host Intrusion Detection Systems 15.6. Which Products to Use for Intrusion Detection 15.7. Conclusion Chapter 16: Vulnerability Scanning 16.1. Introduction 16.2. Brief Historical Background 16.3. How Vulnerability Scanning Technologies Work 16.3.1. Public VS Applications 16.3.1.1. System Weakness Scanning 16.3.1.2. Vulnerability Classification 16.3.2. Web VS Applications 16.3.3. Internal VS Tools 16.4. Vulnerability Scanning Technologies 16.4.1. Public VS 16.4.2. Web VS 16.4.3. Internal VS 16.5. Advantages and Disadvantages of Vulnerability Scanning 16.5.1. Advantages 16.5.2. Disadvantages 16.5.3. Conclusion Chapter 17: Penetration Testing 17.1. Introduction 17.2. Brief Historical Background 17.3. How Penetration Testing Technologies Work 17.4. Penetration Testing Technologies 17.4.1. Application Scanners 17.5. Advantages and Disadvantages of Penetration Testing 17.5.1. Advantages of Penetration Testing 17.5.2. Disadvantages of Penetration Testing 17.6. Conclusion Chapter 18: Conclusion Glossary References Index