185,93 €
206,59 €
-10% with code: EXTRA
Network and Data Security for Non-Engineers
Network and Data Security for Non-Engineers
185,93
206,59 €
  • We will send in 10–14 business days.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with appl…
  • SAVE -10% with code: EXTRA

Network and Data Security for Non-Engineers (e-book) (used book) | bookbook.eu

Reviews

(4.00 Goodreads rating)

Description

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

EXTRA 10 % discount with code: EXTRA

185,93
206,59 €
We will send in 10–14 business days.

The promotion ends in 20d.14:39:52

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 2,07 Book Euros!?
  • Author: Frank M Groom
  • Publisher:
  • Year: 2016
  • Pages: 257
  • ISBN-10: 1498767869
  • ISBN-13: 9781498767866
  • Format: 17.8 x 25.4 x 1.5 cm, softcover
  • Language: English English

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)