How Cybersecurity Really Works A Hands-On Guide for Total Beginners

by
Format: Paperback
Pub. Date: 2021-06-16
Publisher(s): No Starch Press
List Price: $39.99

Buy New

Usually Ships in 5-7 Business Days
$39.95

Rent Book

Select for Price
There was a problem. Please try again later.

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Cybersecurity for Beginners is an engaging, informal introduction to the field of cybersecurity. Readers learn how attackers operate, as well as how to defend individuals and organizations against online attacks.

    An accessible introduction to the field of cybersecurity, requiring no prior technical knowledge
    Readers learn how "black hat" (criminal) hackers select targets, trick victims into divulging private information, deploy malware, steal passwords, steal data, pirate WiFi, and escape detection
    Readers also learn strategies for defending against online attacks

Author Biography

Sam Grubb is a cybersecurity consultant at Edafio, where he focuses on policy, security risk assessments, and security awareness programs. Previously, Grubb worked as a contractor for the National Guard, teaching information assurance courses.

Table of Contents

Chapter 1: An Introduction to Cybersecurity
Chapter 2: Attack Targets on the Internet
Chapter 3: Phishing Tactics
Chapter 4: Malware Infections
Chapter 5: Password Thefts and Other Account Access Tricks
Chapter 6: Network Tapping
Chapter 7: Attacks in the Cloud
Chapter 8: Wireless Network Pirating
Chapter 9: Encryption Cracking
Chapter 10: How to Defeat Black Hats

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.