Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Attack Vectorsthe history of cyberse...
~
Haber, Morey.
Attack Vectorsthe history of cybersecurity /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Attack Vectorsby Morey Haber.
Reminder of title:
the history of cybersecurity /
Author:
Haber, Morey.
Published:
Berkeley, CA :Apress :2025.
Description:
xxxvi, 384 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer security.
Online resource:
https://doi.org/10.1007/979-8-8688-1709-0
ISBN:
9798868817090$q(electronic bk.)
Attack Vectorsthe history of cybersecurity /
Haber, Morey.
Attack Vectors
the history of cybersecurity /[electronic resource] :by Morey Haber. - Berkeley, CA :Apress :2025. - xxxvi, 384 p. :ill., digital ;24 cm.
Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It's Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You'll Learn: Understand the history of cyber-security from the early 1950's through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
ISBN: 9798868817090$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-1709-0doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Attack Vectorsthe history of cybersecurity /
LDR
:03228nmm a2200349 a 4500
001
690620
003
DE-He213
005
20251028120421.0
006
m d
007
cr nn 008maaau
008
260409s2025 cau s 0 eng d
020
$a
9798868817090$q(electronic bk.)
020
$a
9798868817083$q(paper)
024
7
$a
10.1007/979-8-8688-1709-0
$2
doi
035
$a
979-8-8688-1709-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H114 2025
100
1
$a
Haber, Morey.
$3
1006173
245
1 0
$a
Attack Vectors
$h
[electronic resource] :
$b
the history of cybersecurity /
$c
by Morey Haber.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xxxvi, 384 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It's Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.
520
$a
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You'll Learn: Understand the history of cyber-security from the early 1950's through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Privacy.
$3
268519
650
2 4
$a
History of Computing.
$3
276407
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1709-0
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Multimedia
Multimedia file
https://doi.org/10.1007/979-8-8688-1709-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login