Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools - Research Book

Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools - Research Book

Interesting Research Book in Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools

Author(s) Name:  Abbas Moallem

About the Book:

   Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.
Features

  • Presents descriptions for each type of cybersecurity technology and their specifications
  • Explains applications, usages, and offers case studies to enhance comprehension
  • Offers an easy-to-understand classification of existing cybersecurity technologies
  • Provides an understanding of the technologies without getting lost in technical details
  • Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies

  • Table of Contents

  • 1. Cybersecurity Technologies Classification
  • 2. Encryption
  • 3. Authentication
  • 4. Biometrics
  • 5. Firewall Technologies
  • 6. Virus Detection
  • 7. Phishing Detection
  • 8. Endpoint Protection
  • 9. Malware Protection Technology
  • 10. The Internet of Things (IoT)
  • 11. Network Security
  • 12. Location Tracking
  • 13. Surveillance
  • 14. Insider Threat Protection
  • 15. Intrusion Detection
  • 16. Vulnerability Scanning
  • 17. Penetration Testing
  • 18. Conclusion
  • ISBN:  9780367457457

    Publisher:  CRC Press

    Year of Publication:  2021

    Book Link:  Home Page Url