Buch, Englisch, 168 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 249 g
Buch, Englisch, 168 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 249 g
Reihe: What Every Engineer Should Know
ISBN: 978-1-4665-6452-7
Verlag: CRC Press
Exploring the cyber security topics that every engineer should understand, the book discusses:
- Network security
- Personal data security
- Cloud computing
- Mobile computing
- Preparing for an incident
- Incident response
- Evidence handling
- Internet usage
- Law and compliance
- Security and forensic certifications
Application of the concepts is demonstrated through short case studies of real-world incidents chronologically delineating related events. The book also discusses certifications and reference manuals in the area of cyber security and digital forensics.
By mastering the principles in this volume, engineering professionals will not only better understand how to mitigate the risk of security incidents and keep their data secure, but also understand how to break into this expanding profession.
Zielgruppe
Professional Practice & Development
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Security Threats. Social Engineering. Travel. Mobile Devices. Internet. The Cloud. Cyber Physical Systems. Theft. Cyber Security and Digital Forensics Careers. Career Opportunities. Certifications. Cyber Security. Information Security. Security Architecture. Access Controls. Cryptography. Network and Telecommunications Security. Operating System Security. Software Development Security. Database Security. Business Continuity and Disaster Recovery. Physical Security. Legal, Regulations, Compliance, and Investigations. Operations Security. Information Security Governance and Risk Management. Preparing for an Incident. Risk Identification. Host Preparation. Network Preparation. Establishing Appropriate Policies and Procedures. Establishing an Incident Response Team. Preparing a Response Toolkit. Training. Incident Response and Digital Forensics. Incident Response. Incident Response for Cloud Computing. Digital Forensics. Mobile Phone Forensics. The Law. Compliance. Laws for Acquiring Evidence. Evidence Rules. E-discovery. Case Law. Theory to Practice. Case Study 1: It Is All Fun and Games until Something. Gets Deleted. Case Study 2: How Is This Working for You?. Case Study 3: The Weakest Link.