Vai al contenuto principale della pagina

Attack Vectors : The History of Cybersecurity / / by Morey Haber



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Haber Morey Visualizza persona
Titolo: Attack Vectors : The History of Cybersecurity / / by Morey Haber Visualizza cluster
Pubblicazione: Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025
Edizione: 1st ed. 2025.
Descrizione fisica: 1 online resource (306 pages)
Disciplina: 005.8
Soggetto topico: Data protection
Data protection - Law and legislation
Computers - History
Data and Information Security
Privacy
History of Computing
Nota di contenuto: Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It’s Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.
Sommario/riassunto: From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You’ll Learn: Understand the history of cyber-security from the early 1950’s through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
Titolo autorizzato: Attack Vectors  Visualizza cluster
ISBN: 9798868817090
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9911035049303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Professional and Applied Computing Series