|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
on1334105607 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr un|---aucuu |
008 |
220709s2023 si ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d GW5XE
|d YDX
|d OCLCF
|d OCLCQ
|d N$T
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1334101156
|a 1336405248
|
020 |
|
|
|a 9789811926587
|q (electronic bk.)
|
020 |
|
|
|a 9811926581
|q (electronic bk.)
|
020 |
|
|
|z 9789811926570
|
020 |
|
|
|z 9811926573
|
024 |
7 |
|
|a 10.1007/978-981-19-2658-7
|2 doi
|
035 |
|
|
|a (OCoLC)1334105607
|z (OCoLC)1334101156
|z (OCoLC)1336405248
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a TEC041000
|2 bisacsh
|
049 |
|
|
|a HCDD
|
100 |
1 |
|
|a Rawal, Bharat S.
|
245 |
1 |
0 |
|a Cybersecurity and identity access management /
|c Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter.
|
260 |
|
|
|a Singapore :
|b Springer,
|c [2023]
|
300 |
|
|
|a 1 online resource (240 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets -- Manage the Identification and Authentication of People, Devices, And Services -- Integrate Identity as A Third-Party Service -- Implement and Manage Authorization Mechanisms -- Managing the Identity and Access Provisioning Life Cycle -- Conduct Security Control Testing -- Collect Security Process Data -- Recovery Strategies for Database -- Analyze Test Output and Generate A Report -- Ensure Appropriate Asset Retention -- Determine Information and Security Controls.
|
520 |
|
|
|a This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed July 15, 2022).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Manogaran, Gunasekaran,
|d 1989-
|1 https://id.oclc.org/worldcat/entity/E39PCjvQRrwdc36WVMrTby8t8C
|
700 |
1 |
|
|a Peter, Alexender.
|
776 |
0 |
8 |
|i Print version:
|a Rawal, Bharat S.
|t Cybersecurity and Identity Access Management.
|d Singapore : Springer, ©2022
|z 9789811926570
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-981-19-2658-7
|y Click for online access
|
903 |
|
|
|a SPRING-ALL2023
|
994 |
|
|
|a 92
|b HCD
|