
Libro How Cybersecurity Really Works
en 24 meses de
Lo que tienes que saber de este producto
- Año de publicación: 2021
- Tapa del libro: Blanda
- Género: Informática.
- Subgénero: .
- Manual.
- Número de páginas: 216.
- Edad recomendada: de 12 años a 99 años.
- Incluye .
- Dimensiones: 1cm de ancho x 1cm de alto.
- Peso: 1g.
- ISBN: 9781718501287.
Características del producto
Características principales
Autor | Sam Grubb |
---|---|
Idioma | Inglés |
Editorial del libro | No Starch Press |
Tapa del libro | Blanda |
Año de publicación | 2021 |
Otros
Cantidad de páginas | 216 |
---|---|
Altura | 1 cm |
Ancho | 1 cm |
Peso | 1 g |
Con páginas para colorear | No |
Con realidad aumentada | No |
Género del libro | Informática |
Tipo de narración | Manual |
Edad mínima recomendada | 12 años |
Cantidad de libros por set | 1 |
Descripción
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners
How Cybersecurity Really Works is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.
How Cybersecurity Really Works is the perfect introduction to cybersecurity. Whether you’re a computer science student or a business professional, it will teach you the basics without all the jargon.
This beginners guide covers different types of attacks, common tactics used by online adversaries, and defensive strategies you can use to protect yourself. You’ll learn what security professionals do, what an attack looks like from a cybercriminal’s viewpoint, and how to implement sophisticated cybersecurity measures on your own devices.
In addition, you’ll find explanations of topics like malware, phishing, and social engineering attacks, coupled with real-world examples and hands-on exercises to help you apply what you’ve learned. You’ll explore ways to bypass access controls, prevent infections from worms and viruses, and protect your cloud accounts from attackers.
You’ll also learn how to:
• Analyze emails to detect phishing attempts
• Use SQL injection to attack a website
• Examine malware from the safety of a sandbox environment
• Use the command line to evaluate and improve your computer and network security
• Deploy encryption and hashing to protect your files
• Create a comprehensive risk management plan
You can’t afford to ignore cybersecurity anymore, but attackers won’t wait while you read a long technical manual. That’s why How Cybersecurity Really Works teaches you just the essentials you need to think beyond antivirus and make the right decisions to keep the online monsters at bay.
Sin garantía
Vendido por GREVILLEA
+10mil Productos
+5mil
Ventas concretadas
No brinda buena atención
Entrega sus productos con demora
Medios de pago
Meses sin Tarjeta
Tarjetas de crédito
¡Paga en hasta 3 cuotas!
Tarjetas de débito
Efectivo
Preguntas y respuestas
¿Qué quieres saber?
Pregúntale al vendedor
Publicación #2027329614
DenunciarSe abrirá en una nueva ventana