Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
"synopsis" may belong to another edition of this title.
Stephan S. Jones, PhD, is the director of the Center for Information and Communication Sciences, where he is also a professor delivering core technology courses in the graduate-only program. His industry experience is as a field engineer and owner of a telecommunications company providing voice and data solutions for business/commercial systems in the Midwest. In academe, he has published or edited numerous books and texts associated with simplifying complex communication technologies for nonengineering students to comprehend. He is actively engaged in supporting broadband technology deployments to underserved and unserved regions of the country and providing technical support for non-profit organizations with student participation.
Frank Groom, PhD, is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs. Among his best known books are The Future of ATM and The ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin– Milwaukee in information systems. He is the former senior director of information systems for Ameritech.
"About this title" may belong to another edition of this title.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 26085465-n
Quantity: Over 20 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2716030242620
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 26085465-n
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 320. Seller Inventory # 371603401
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9781498767866
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 320. Seller Inventory # 26374442006
Seller: suspiratio - online bücherstube lic.phil h.b., Basel, Switzerland
Softcover. Condition: Sehr gut. 1. Auflage. broschiert, geringe lagerspuren am cover, sonst sehr gut. Seller Inventory # XL-463-roubv
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781498767866_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New. Seller Inventory # 6666-IUK-9781498767866
Quantity: 10 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9781498767866