ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools

دانلود کتاب آشنایی با فناوری‌های امنیت سایبری: راهنمای انتخاب ابزارهای مناسب امنیت سایبری

Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools

مشخصات کتاب

Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools

ویرایش: 1 
نویسندگان:   
سری: The human element in smart and intelligent systems 
ISBN (شابک) : 9780367457457, 1032157844 
ناشر: CRC Press 
سال نشر: 2022 
تعداد صفحات: 225 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 مگابایت 

قیمت کتاب (تومان) : 51,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب آشنایی با فناوری‌های امنیت سایبری: راهنمای انتخاب ابزارهای مناسب امنیت سایبری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Acknowledgments
Introduction
Author
List of Figures
Chapter 1: Cybersecurity Technologies Classification
	1.1. Introduction
	1.2. Different Categories of Cyber Technologies
	1.3. Technology Classification
Chapter 2: Encryption
	2.1. Introduction
	2.2. Brief Historical Background
	2.3. How Encryption Technologies Work
	2.4. Encryption Technologies
		2.4.1. RSA (Rivest-Shamir-Adleman)
		2.4.2. Blowfish Cipher
		2.4.3. Data Encryption Standard (Des)
		2.4.4. Triple Des (3Des or Tdes)
		2.4.5. Twofish
	2.5. Advantages and Disadvantages of Blowfish and RSA Encryption
		2.5.1. Advantages
			2.5.1.1. RSA
			2.5.1.2. Blowfish
		2.5.2. Disadvantages
			2.5.2.1. RSA
			2.5.2.2. Blowfish
	2.6. Which Products Use Encryptions
		2.6.1. Products Using Blowfish
		2.6.2. Products Using RSA
	2.7. Conclusion
Chapter 3: Authentication
	3.1. Introduction
	3.2. Brief Historical Background
	3.3. How Authentication Technologies Work
		3.3.1. Secret Knowledge-Based Authentication
			3.3.1.1. Personal Identification Number (PIN) and Password
			3.3.1.2. Cognitive Knowledge Question
			3.3.1.3. Pattern and Graphical Password
		3.3.2. Token-Based Approach
		3.3.3. Biometrics
		3.3.4. Compound Authentication
		3.3.5. Storing Passwords and Usernames
	3.4. Authentication Technologies
	3.5. Advantages and Disadvantages of Authentication Technoglogies
		3.5.1. Advantages
			3.5.1.1. Personal Identification Number (PIN) and Password Approach
			3.5.1.2. Cognitive Knowledge Question (CKQ)
			3.5.1.3. Pattern and Graphical Password
			3.5.1.4. Token-Based Passwords
			3.5.1.5. Biometric Authentication
			3.5.1.6. Compound Authentication
		3.5.2. Disadvantages
			3.5.2.1. Personal Identification Number (PIN) and Password Approach
			3.5.2.2. Cognitive Knowledge Question
			3.5.2.3. Pattern and Graphical Passwords
			3.5.2.4. Token-Based One-Time Passwords (OTP)
			3.5.2.5. Biometric Authentication
			3.5.2.6. Compound Authentication
	3.6. What Products Use Authentications
	3.7. Conclusion
Chapter 4: Biometrics
	4.1. Introduction
	4.2. Brief Historical Background
	4.3. How Biometric Technologies Work
		4.3.1. Palm
		4.3.2. Fingerprints
			4.3.2.1. Optical Scanners
			4.3.2.2. Capacitive Scanners
			4.3.2.3. Ultrasonic Scanners
		4.3.3. Face
		4.3.4. IRIS
		4.3.5. Voice
	4.4. Biometric Technologies
	4.5. Biometric Traits Comparison
	4.6. Advantages and Disadvantages of Biometric Technologies
		4.6.1. Advantages of Using Biometrics
		4.6.2. Disadvantages of Using Biometrics
	4.7. What Products Use Biometrics
		4.7.1. Cars
		4.7.2. Banking
		4.7.3. Health Care
		4.7.4. Food and Beverages
		4.7.5. Border Control
		4.7.6. Education
	4.8. Conclusion
Chapter 5: Firewall Technologies
	5.1. Introduction
	5.2. Brief Historical Background
	5.3. How Firewall Technologies Work
	5.4. Firewall Technologies
		5.4.1. Stateless Firewalls or Packet-Filtering
		5.4.2. Stateful Firewalls or Dynamic Packet Inspection
		5.4.3. Application Proxy/Proxy Server Firewalls
		5.4.4. Cloud Firewalls
	5.5. Advantages and Disadvantages of Firewall Technologies
		5.5.1. Advantages
		5.5.2. Disadvantages
	5.6. Conclusion
Chapter 6: Virus Detection
	6.1. Introduction
	6.2. Brief Historical Background
	6.3. How Virus Detection Technologies Work
		6.3.1. Virus Scanning and Detection Process
	6.4. Virus Detection Technologies
		6.4.1. Sandbox Detection
		6.4.2. Data Mining Techniques
		6.4.3. Signature-Based Detection
		6.4.4. Heuristic Detection
		6.4.5. Real-Time Protection
	6.5. Advantages and Disadvantages of Virus Detection Technologies
		6.5.1. Advantages
		6.5.2. Disadvantages
	6.6. Approaches Used in Virus Detection
	6.7. Conclusion
Chapter 7: Phishing Detection
	7.1. Introduction
	7.2. Brief Historical Background
	7.3. How Phishing Detection Technologies Work
	7.4. Phishing Detection Technologies
		7.4.1. Visual Similarity-Based Phishing Detection
		7.4.2. Blacklist-Based Phishing Detection
		7.4.3. Web Crawling-Based Phishing Attack Detection
	7.5. Advantages and Disadvantages of Phishing Detection Technologies
		7.5.1. Advantages
			7.5.1.1. Visual Similarity-Based Phishing Detection
			7.5.1.2. Blacklist-Based Phishing Detection
			7.5.1.3. Web Crawling-Based Phishing Attack Detection
		7.5.2. Disadvantages
			7.5.2.1. Visual Similarity-Based Phishing Detection
			7.5.2.2. Blacklist-Based Phishing Detection
			7.5.2.3. Web Crawling-Based Phishing Attack Detection
	7.6. What Products Use Phishing Detection
		7.6.1. Blacklist-Based Phishing Detection
	7.7. Conclusion
Chapter 8: Endpoint Protection
	8.1. Introduction
	8.2. Brief Historical Background
		8.2.1. Traditional Antivirus
		8.2.2. Endpoint Detection and Response (Edr)
		8.2.3. Next-Generation Antivirus Software (NGAV)
		8.2.4. Operating System (OS) Centric Security
	8.3. How Endpoint Protection Technologies Work
		8.3.1. Antivirus
			8.3.1.1. Signature
			8.3.1.2. Behavioral Detection
			8.3.1.3. Machine Learning
		8.3.2. Secure Email Gateways (Segs)
	8.4. Endpoint Protection Technologies
		8.4.1. Antivirus Solutions
		8.4.2. Endpoint Detection and Response
		8.4.3. Secure Email Gateways
	8.5. Advantages and Disadvantages of Endpoint Protection Technologies
		8.5.1. Antivirus Solutions
			8.5.1.1. Advantages
			8.5.1.2. Disadvantages
		8.5.2. Endpoint Detection and Response
			8.5.2.1. Advantages
			8.5.2.2. Disadvantages
		8.5.3. Secure Email Gateways
			8.5.3.1. Advantages
			8.5.3.2. Disadvantages
	8.6. What Products Use Endpoint Protection
		8.6.1. Antivirus Solutions
		8.6.2. Endpoint Detection and Response
		8.6.3. Secure Email Gateways
	8.7. Conclusion
Chapter 9: Malware Protection Technology
	9.1. Introduction
	9.2. Brief Historical Background
	9.3. How Malware Protection Technologies Work
		9.3.1. Heuristic Analysis
		9.3.2. Signature-Based Safety
		9.3.3. Host-Based Intrusion Prevention Systems
	9.4. Malware Protection Technologies
		9.4.1. Main Category of Malware Detection Technology
			9.4.1.1. Heuristic Analysis
			9.4.1.2. Signature-Based Security
			9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS)
	9.5. Advantages and Disadvantages of Malware Protection
		9.5.1. Advantages
			9.5.1.1. Heuristic Analysis
			9.5.1.2. Signature-Based Protection
			9.5.1.3. Host-Based Intrusion Prevention Systems
		9.5.2. Disadvantages
			9.5.2.1. Heuristic Analysis
			9.5.2.2. Signature-Based Protection
			9.5.2.3. Host-Based Intrusion Prevention Systems
	9.6. What Products Use Malware Protection
	9.7. Conclusion
Chapter 10: The Internet of Things (IoT)
	10.1. Introduction
	10.2. Brief Historical Background
	10.3. How IoT Technologies Work
		10.3.1. End-to-End Platform
		10.3.2. Connectivity Platform
		10.3.3. Cloud and Data Platforms
	10.4. Iot Security Technologies
		10.4.1. Securing IoT Devices
		10.4.2. Smart Device Protection Technologies
			10.4.2.1. Host Identity Protocol (HIP)
			10.4.2.2. Hip Diet Exchange
			10.4.2.3. Intrusion Detection and Mitigation Framework
			10.4.2.4. Intrusion Detection System
			10.4.2.5. Openflow
			10.4.2.6. Software-Defined Networking
	10.5. Advantages and Disadvantages of IoT Security Technologies
		10.5.1. Advantages
		10.5.2. Disadvantages
	10.6. What Products Use IoT Technologies
	10.7. Conclusion
Chapter 11: Network Security
	11.1. Introduction
	11.2. Brief Historical Background
	11.3. How Network Security Technologies Work
		11.3.1. Firewall
		11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention
		11.3.3. Wi-Fi Protected Access 3 (WPA3)
	11.4. Network Security Technologies
		11.4.1. Firewalls
		11.4.2. Email Security
		11.4.3. Antivirus and Antimalware Software
		11.4.4. Virtual Private Network (VPN)
		11.4.5. Intrusion Prevention Systems (IDS)
	11.5. Advantages and Disadvantages of Network Security
		11.5.1. Advantages of Network Security
		11.5.2. Disadvantages of Network Security
	11.6. Which Products Use Network Security
		11.6.1. Banks/Financial Institutions
		11.6.2. Hospitals/Medical Institutions
		11.6.3. Cloud Computing
		11.6.4. Use of Network Security Technologies
		11.6.5. Firewalls
		11.6.6. Antivirus
		11.6.7. Security Information and Event Management
	11.7. Conclusion
Chapter 12: Location Tracking
	12.1. Introduction
	12.2. Brief Historical Background
	12.3. How Location Tracking Technologies Work
		12.3.1. Uses of GPS Technology
	12.4. Location Tracking Technologies
		12.4.1. GPS Technology
		12.4.2. Radio Frequency Identification
		12.4.3. Internet Tracking
		12.4.4. Advantages and Disadvantages of Location Tracking
			12.4.4.1. Advantages of Location Tracking
			12.4.4.2. Disadvantages of Location Tracking
	12.5. Which Products Use Location Tracking
	12.6. Conclusion
Chapter 13: Surveillance
	13.1. Introduction
	13.2. Brief Historical Background
	13.3. How Surveillance Technology Works
		13.3.1. Video Surveillance and Crime
	13.4. Surveillance Technologies
		13.4.1. Computer
		13.4.2. Telephones
		13.4.3. Aerial Surveillance
	13.5. Advantages and Disadvantages of Surveillance Technologies
		13.5.1. Advantages
		13.5.2. Disadvantages
	13.6. Which Products Use Surveillance
	13.7. Conclusion
Chapter 14: Insider Threat Protection
	14.1. Introduction
	14.2. Brief Historical Background
	14.3. How Insider Threat Protection Technologies Work
	14.4. Insider Threat Detection Technologies
		14.4.1. Data Loss Prevention
		14.4.2. Email Security Applications
		14.4.3. Privileged Access Management (Pam)
	14.5. User Activity Monitoring and Behavior Analytics
	14.6. Advantages and Disadvantages of Insider Threat Detection
		14.6.1. Advantages
		14.6.2. Disadvantages
	14.7. Conclusion
Chapter 15: Intrusion Detection
	15.1. Introduction
	15.2. Brief Historical Background
	15.3. How Intrusion Detection Technologies Work
		15.3.1. Network-Based Intrusion Prevention System
		15.3.2. Host Intrusion Detection Systems
	15.4. Intrusion Detection Technologies
	15.5. Advantages and Disadvantages of Intrusion Detection Systems
		15.5.1. Advantages
			15.5.1.1. Network-Based Intrusion Prevention System
			15.5.1.2. Host Intrusion Detection Systems
		15.5.2. Disadvantages
			15.5.2.1. Network-Based Intrusion Prevention System
			15.5.2.2. Host Intrusion Detection Systems
	15.6. Which Products to Use for Intrusion Detection
	15.7. Conclusion
Chapter 16: Vulnerability Scanning
	16.1. Introduction
	16.2. Brief Historical Background
	16.3. How Vulnerability Scanning Technologies Work
		16.3.1. Public VS Applications
			16.3.1.1. System Weakness Scanning
			16.3.1.2. Vulnerability Classification
		16.3.2. Web VS Applications
		16.3.3. Internal VS Tools
	16.4. Vulnerability Scanning Technologies
		16.4.1. Public VS
		16.4.2. Web VS
		16.4.3. Internal VS
	16.5. Advantages and Disadvantages of Vulnerability Scanning
		16.5.1. Advantages
		16.5.2. Disadvantages
		16.5.3. Conclusion
Chapter 17: Penetration Testing
	17.1. Introduction
	17.2. Brief Historical Background
	17.3. How Penetration Testing Technologies Work
	17.4. Penetration Testing Technologies
		17.4.1. Application Scanners
	17.5. Advantages and Disadvantages of Penetration Testing
		17.5.1. Advantages of Penetration Testing
		17.5.2. Disadvantages of Penetration Testing
	17.6. Conclusion
Chapter 18: Conclusion
Glossary
References
Index




نظرات کاربران