Matches in SemOpenAlex for { <https://semopenalex.org/work/W2965213477> ?p ?o ?g. }
Showing items 1 to 71 of
71
with 100 items per page.
- W2965213477 abstract "Most introductory books on cyber security are either too technical for popular readers, or too casual for professional ones. This book, in contrast, is intended to reside somewhere in the middle. That is, while concepts are explained in a friendly manner for any educated adult, the book also necessarily includes network diagrams with the obligatory references to clouds, servers, and packets. But dont let this scare you. Anyone with an ounce of determination can get through every page of this book, and will come out better informed, not only on cyber security, but also on computing, networking, and software. While it is true that college students will find the material particularly accessible, any adult with the desire to learn will find this book part of an exciting new journey. A great irony is that the dizzying assortment of articles, posts, and books currently available on cyber security makes it difficult to navigate the topic. Furthermore, with so much information coming from writers with questionable backgrounds in cyber security, separating the wheat from the chaff has become an almost impossible task for most readers, experienced or otherwise. This book is written specifically to address that problem. That is, we set out to create an accessible but technically accurate work on cyber security that would not insult the intelligence of our readers. We avoid the temptation to navigate away from the technical issues, choosing instead to steer toward the detailed concepts in the hopes that our readers will develop new understanding and insights. The material here provides a technical grounding that is commensurate with what you might receive in a college course on the topic. If you are an engineer, developer, or student, then you are certainly in the right place. On the other hand, if you work in management, executive leadership, or some other non-technical role, then this is exactly the technical grounding in cyber that youve been looking for. Anyone who has not been sleeping in a cave the past few years knows the consequences of misguided decision-making in cyber security. Business leaders colliding with this complex issue will find their intellectual property gone and their services blocked by hackers. Government and political leaders who misstep in this area will find their careers, programs, and campaigns ruined. Consider this: Target, Home Depot, and Sony have seen massive attacks on their infrastructure, and most citizens, including our leaders, have no idea how or why this occurred. Similarly, we watched data leaks from the US Office of Personnel Management and the Democratic National Committee, and most people have only a vague sense of how such cyber attacks were accomplished. Perhaps more disturbingly, decision-makers in our society have no idea how to reduce this risk. Because they typically have zero technical understanding, they are forced to suggest simple, trite measures they can understand like awareness, penalties, and compliance. Our approach here is to demonstrate that cyber security attacks are best avoided through improved technology and architecture. Written from the perspective of the professional cyber security executive, long-time academic, and industry analyst (Edward Amoroso), and the graduate computer science student, software developer, and occasional hacker (Matthew Amoroso), this book provides a concise technical introduction to cyber security that keeps things as straightforward as possible, but without veering into silly analogies. If you successfully complete this book, you will no longer have to shrug when asked about cyber security. Rather, you will be able to lean in and offer an informed opinion based on an introductory grounding in the fundamental aspects of cyber security technology. Our goal is to expand your understanding and make you a more informed and educated adult." @default.
- W2965213477 created "2019-08-13" @default.
- W2965213477 creator A5026140922 @default.
- W2965213477 creator A5062946597 @default.
- W2965213477 date "2017-08-11" @default.
- W2965213477 modified "2023-09-24" @default.
- W2965213477 title "From CIA to APT: An Introduction to Cyber Security" @default.
- W2965213477 hasPublicationYear "2017" @default.
- W2965213477 type Work @default.
- W2965213477 sameAs 2965213477 @default.
- W2965213477 citedByCount "0" @default.
- W2965213477 crossrefType "book" @default.
- W2965213477 hasAuthorship W2965213477A5026140922 @default.
- W2965213477 hasAuthorship W2965213477A5062946597 @default.
- W2965213477 hasConcept C108827166 @default.
- W2965213477 hasConcept C127413603 @default.
- W2965213477 hasConcept C136764020 @default.
- W2965213477 hasConcept C15744967 @default.
- W2965213477 hasConcept C177264268 @default.
- W2965213477 hasConcept C17744445 @default.
- W2965213477 hasConcept C199360897 @default.
- W2965213477 hasConcept C199539241 @default.
- W2965213477 hasConcept C201995342 @default.
- W2965213477 hasConcept C2779271205 @default.
- W2965213477 hasConcept C2780451532 @default.
- W2965213477 hasConcept C2781426162 @default.
- W2965213477 hasConcept C38652104 @default.
- W2965213477 hasConcept C41008148 @default.
- W2965213477 hasConcept C77805123 @default.
- W2965213477 hasConceptScore W2965213477C108827166 @default.
- W2965213477 hasConceptScore W2965213477C127413603 @default.
- W2965213477 hasConceptScore W2965213477C136764020 @default.
- W2965213477 hasConceptScore W2965213477C15744967 @default.
- W2965213477 hasConceptScore W2965213477C177264268 @default.
- W2965213477 hasConceptScore W2965213477C17744445 @default.
- W2965213477 hasConceptScore W2965213477C199360897 @default.
- W2965213477 hasConceptScore W2965213477C199539241 @default.
- W2965213477 hasConceptScore W2965213477C201995342 @default.
- W2965213477 hasConceptScore W2965213477C2779271205 @default.
- W2965213477 hasConceptScore W2965213477C2780451532 @default.
- W2965213477 hasConceptScore W2965213477C2781426162 @default.
- W2965213477 hasConceptScore W2965213477C38652104 @default.
- W2965213477 hasConceptScore W2965213477C41008148 @default.
- W2965213477 hasConceptScore W2965213477C77805123 @default.
- W2965213477 hasLocation W29652134771 @default.
- W2965213477 hasOpenAccess W2965213477 @default.
- W2965213477 hasPrimaryLocation W29652134771 @default.
- W2965213477 hasRelatedWork W144903931 @default.
- W2965213477 hasRelatedWork W1480469971 @default.
- W2965213477 hasRelatedWork W1487646227 @default.
- W2965213477 hasRelatedWork W1505737535 @default.
- W2965213477 hasRelatedWork W1527762547 @default.
- W2965213477 hasRelatedWork W2023131486 @default.
- W2965213477 hasRelatedWork W203326795 @default.
- W2965213477 hasRelatedWork W2084044852 @default.
- W2965213477 hasRelatedWork W2096706053 @default.
- W2965213477 hasRelatedWork W2357285421 @default.
- W2965213477 hasRelatedWork W2398378059 @default.
- W2965213477 hasRelatedWork W2481619157 @default.
- W2965213477 hasRelatedWork W2526975507 @default.
- W2965213477 hasRelatedWork W2744589616 @default.
- W2965213477 hasRelatedWork W2784020906 @default.
- W2965213477 hasRelatedWork W2789609373 @default.
- W2965213477 hasRelatedWork W2943349212 @default.
- W2965213477 hasRelatedWork W2948720517 @default.
- W2965213477 hasRelatedWork W833628528 @default.
- W2965213477 hasRelatedWork W1642925837 @default.
- W2965213477 isParatext "false" @default.
- W2965213477 isRetracted "false" @default.
- W2965213477 magId "2965213477" @default.
- W2965213477 workType "book" @default.