15% Off - Limited time only. Exclusive web offer for individuals on print titles only. Terms & Conditions may apply.
Frank M. Groom, Kevin Groom, Stephan S. Jones
August 22, 2016
by Auerbach Publications
Reference - 257 Pages - 121 B/W Illustrations
ISBN 9781498767866 - CAT# K29213
For Librarians Available on CRCnetBASE >>
SAVE ~$11.99 on each
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
Introduction to Security Threats. The Anthem Breach: A Case Study. Anonymous Persistent Threats. Creating Secure Code. Providing a Secure Architecture. The Nature of Hacking Attacks. Malware, Viruses, Worms, Bugs, and Botnets. Cryptography and the RSA Algorithm. Browser Security. Banking and Financial. Web Application Security. Web Security and DNS Security. Network Security. Network Defenses. Denial of Service Attacks. Mobile Platform Security. Wireless Security. The Stuxnet Worm, Zero Dayattacks. Cyber-Warfare. Conclusion.