Cybersecurity and identity access management / Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter.

This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The boo...

Full description

Saved in:
Bibliographic Details
Main Author: Rawal, Bharat S.
Other Authors: Manogaran, Gunasekaran, 1989-, Peter, Alexender
Format: eBook
Language:English
Published: Singapore : Springer, [2023]
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 on1334105607
003 OCoLC
005 20241006213017.0
006 m o d
007 cr un|---aucuu
008 220709s2023 si ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d OCLCF  |d OCLCQ  |d N$T  |d OCLCO  |d OCLCL 
019 |a 1334101156  |a 1336405248 
020 |a 9789811926587  |q (electronic bk.) 
020 |a 9811926581  |q (electronic bk.) 
020 |z 9789811926570 
020 |z 9811926573 
024 7 |a 10.1007/978-981-19-2658-7  |2 doi 
035 |a (OCoLC)1334105607  |z (OCoLC)1334101156  |z (OCoLC)1336405248 
050 4 |a QA76.9.A25 
072 7 |a TEC041000  |2 bisacsh 
049 |a HCDD 
100 1 |a Rawal, Bharat S. 
245 1 0 |a Cybersecurity and identity access management /  |c Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter. 
260 |a Singapore :  |b Springer,  |c [2023] 
300 |a 1 online resource (240 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls. 
520 |a This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 15, 2022). 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Access control. 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Manogaran, Gunasekaran,  |d 1989-  |1 https://id.oclc.org/worldcat/entity/E39PCjvQRrwdc36WVMrTby8t8C 
700 1 |a Peter, Alexender. 
776 0 8 |i Print version:  |a Rawal, Bharat S.  |t Cybersecurity and Identity Access Management.  |d Singapore : Springer, ©2022  |z 9789811926570 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-981-19-2658-7  |y Click for online access 
903 |a SPRING-ALL2023 
994 |a 92  |b HCD