TOP
0
0
即日起~6/30,暑期閱讀書展,好書7折起
Cybersecurity Awareness for Employees: Learn Fast How to protect yourself and your Business

Cybersecurity Awareness for Employees: Learn Fast How to protect yourself and your Business

商品資訊

定價
:NT$ 719 元
無庫存,下單後進貨(到貨天數約30-45天)
可得紅利積點:21 點
相關商品
商品簡介

商品簡介

In this book you will learn over 100 terms and concepts related to Cybersecurity. This book is designed for beginners or employees to have a better understanding and awareness of Threats and Vulnerabilities. This book will teach you how to protect yourself and your Business from the most common Cyber-attacks in no time BUY THIS BOOK NOW AND GET STARTED TODAY You will learn: -Viruses, Cryptomalware and Ransomware, Trojans, Rootkits, Keyloggers, Adware, Spyware, -Botnets, Logic Bomb, Backdoors, Social Engineering, Social Engineering Attacks, -Vishing, Tailgaiting, Impersonation, Dumpster Diving, Shoulder Surfing, Hoaxes, -Watering Hole Attack, DDoS Attack, Replay Attacks, Man in the Middle Attack, -Buffer Overflow Attack, SQL Injection Attack, LDAP Injection Attack, -XML Injection Attack, Cross-Site Scripting, Cross-Site Request Forgery, -Privilege Escalation, ARP Poisoning, Smurf Attack, DNS Poisoning, -Zero Day Attacks, Pass the Hash, Clickjacking, Session Hijacking, -Typo Squatting and URL Hijacking, Shimming, Refactoring, IP/MAC Spoofing, -Wireless Replay Attacks, IV Attack, Rogue Access Points, Evil Twin, WPS Attacks-Bluejacking and Bluesnarfing, NFC Attacks, Dissociation Attack, Brute Force Attack, -Dictionary Attacks, Birthday Attack, Rainbow Tables, Collision and Downgrade Attack, -Script Kiddies, Hacktivists, Nation States/APT, Organized Crime, Insiders, Competitors, -Open Source Intelligence (OSINT), Penetration Test Steps, Active and Passive Reconnaissance, -Pivoting, Persistence, Escalation of Privilege, Black Box, White Box, and Grey Box Testing-Pen Testing vs. Vulnerability Scanning, Red vs. Blue Teams, -How to define the Vulnerability Scanning Process-How to Identify Vulnerability and Lack of Security Controls-How to Identify Common Misconfigurations, Credentialed vs. Non-credentialed, False Positive-Rules of Engagement and Authorization, Impact Assessment, Race Conditions, -Support/Lifecycle Vulnerabilities, Secure Coding Concepts, Resource Exhaustion, -Vulnerable Business Processes, Weak Cipher Suites and Implementations, Memory Leaks, -Integer Overflow, Pointer Dereference, DLL Injection, System Sprawl, -Architecture Design Weaknesses, Data Loss Prevention & RAID, -Proxy Servers, IDS & IPS Systems, VPN Basics and more...BUY THIS BOOK NOW AND GET STARTED TODAY

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 719
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區