![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
Cybersecurity Fundamentals
Publisher:
| Author:
| Language:
| Format:
Publisher:
Author:
Language:
Format:
₹799 ₹719
Save: 10%
In stock
Ships within:
In stock
ISBN:
Page Extent:
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ‘Cybersecurity’ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally.
The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ‘Cybersecurity’ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally.
The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
About Author
Reviews
There are no reviews yet.
Related products
RELATED PRODUCTS
Head First Java: A Brain-Friendly Guide, Third Edition
Save: 5%
Mastering Bitcoin: Programming the Open Blockchain, Second Edition
Save: 25%
Cryptography and Network Security (2nd Impression 2006)
Save: 60%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Linear Programming for Project Management Professionals 
Save: 10%
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Software Engineering A Practitioner’s Approach (7th Ed)
Save: 60%
The Big Score: The Billion Dollar Story Of Silicon Valley
Save: 25%
Reviews
There are no reviews yet.