語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Attack Vectorsthe history of cyberse...
~
Haber, Morey.
Attack Vectorsthe history of cybersecurity /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Attack Vectorsby Morey Haber.
其他題名:
the history of cybersecurity /
作者:
Haber, Morey.
出版者:
Berkeley, CA :Apress :2025.
面頁冊數:
xxxvi, 384 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/979-8-8688-1709-0
ISBN:
9798868817090$q(electronic bk.)
Attack Vectorsthe history of cybersecurity /
Haber, Morey.
Attack Vectors
the history of cybersecurity /[electronic resource] :by Morey Haber. - Berkeley, CA :Apress :2025. - xxxvi, 384 p. :ill., digital ;24 cm.
Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It's Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You'll Learn: Understand the history of cyber-security from the early 1950's through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
ISBN: 9798868817090$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-1709-0doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Attack Vectorsthe history of cybersecurity /
LDR
:03228nmm a2200349 a 4500
001
690620
003
DE-He213
005
20251028120421.0
006
m d
007
cr nn 008maaau
008
260409s2025 cau s 0 eng d
020
$a
9798868817090$q(electronic bk.)
020
$a
9798868817083$q(paper)
024
7
$a
10.1007/979-8-8688-1709-0
$2
doi
035
$a
979-8-8688-1709-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
H114 2025
100
1
$a
Haber, Morey.
$3
1006173
245
1 0
$a
Attack Vectors
$h
[electronic resource] :
$b
the history of cybersecurity /
$c
by Morey Haber.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xxxvi, 384 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It's Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion.
520
$a
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You'll Learn: Understand the history of cyber-security from the early 1950's through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Privacy.
$3
268519
650
2 4
$a
History of Computing.
$3
276407
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1709-0
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-1709-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入