Cyber Security Essentials 1st edition by James Graham, Ryan Olson, Rick Howard – Ebook PDF Instant Download/Delivery.
Full download Cyber Security Essentials 1st edition after payment

Product details:
ISBN 10: 1439851239
ISBN 13: 978-1439851234
Author: James Graham, Ryan Olson, Rick Howard
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.
To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book:
- Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors
- Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding
- Supplies actionable advice for the mitigation of threats
- Breaks down the code used to write exploits into understandable diagrams
This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Cyber Security Essentials 1st Table of contents:
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Basic Cryptography
Symmetric Encryption
Public Key Encryption
The Domain Name System (DNS)
Firewalls
Virtualization
Radio-Frequency Identification
Microsoft Windows Security Principles
Windows Tokens
Window Messaging
Windows Program Execution
The Windows Firewall
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics)
How and Why Attackers Use Proxies
Tunneling Techniques
Fraud Techniques
Phishing, Smishing, Vishing and Mobile Malicious Code
Rogue Anti-Virus
Click Fraud
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Format-String Vulnerabilities
SQL Injection
Malicious PDF Files
Race Conditions
Web Exploit Tools
DoS Conditions
Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Rootkits
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Token Kidnapping
Virtual Machine Detection
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
DLL Injection
Browser Helper Objects
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
iDefense Special File Investigation Tools
People also search for Cyber Security Essentials 1st:
uk cyber security essentials
cisco cyber security essentials certification
ec council cyber security essentials
cyber security essentials certification
cyber security essentials course