Hassan / Hijazi | Cybersecurity | Buch | 978-0-367-44214-9 | sack.de

Buch, Englisch, 280 Seiten, Format (B × H): 156 mm x 234 mm

Hassan / Hijazi

Cybersecurity

A Practical Introduction
1. Auflage 2025
ISBN: 978-0-367-44214-9
Verlag: Taylor & Francis Ltd

A Practical Introduction

Buch, Englisch, 280 Seiten, Format (B × H): 156 mm x 234 mm

ISBN: 978-0-367-44214-9
Verlag: Taylor & Francis Ltd


In today's hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate and counter cyber threats, navigating the increasingly dangerous digital landscape.

From cryptographic foundations to advanced persistent threats, you'll master the core concepts that transform novices into digital defenders. Each chapter tackles critical security domains, including online tracking defenses, ransomware identification, social engineering countermeasures, and OSINT techniques used by both defenders and attackers. Discover how to:

- Implement multi-layered protection against sophisticated malware

- Recognize and respond to psychological manipulation tactics

- Navigate the concealed territories of the Deep and Dark Web safely

- Deploy enterprise-grade network security architectures

- Leverage AI-driven threat detection to stay ahead of attackers.

Whether you're securing personal devices against tracking, protecting enterprise networks from nation-state actors, or building comprehensive defense strategies, this book is for working professionals, computing specialists, and IT enthusiasts, providing you with practical, actionable knowledge for today's security challenges.

Key Features:

- Bridges theoretical cybersecurity concepts with practical defense strategies

- Provides actionable knowledge on emerging threats

- Uses accessible language for both beginners and experienced practitioners

- Equips readers with a comprehensive understanding of the entire threat landscape

- Addresses both human and system vulnerabilities

- Delivers insider perspective on threats and countermeasures

- Incorporates cutting-edge security approaches that prepare readers for the next generation of cybersecurity challenges

Hassan / Hijazi Cybersecurity jetzt bestellen!

Zielgruppe


Professional Practice & Development

Weitere Infos & Material


1. Understanding Cybersecurity  2. Cyber anonymity and Web Layers  3. Introduction to Cryptography  4. Cyber Threats  5. Advanced persistence threat (APT)  6. Ransomware  7. Social Engineering Attacks & Mitigation Strategies  8. Open Source Intelligence Techniques (OSINT)  9. Endpoint defense strategies  10. Enterprise network defense strategies


Nihad A. Hassan is an independent cybersecurity consultant, digital forensics and cyber OSINT expert, online blogger and author with over 15 years of experience in information security research. He has completed multiple technical security consulting engagements and authored six books and numerous articles on information security. Nihad is highly involved in security training, education and motivation. For more information, go to www.osint.link.

Rami Hijazi is the general manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc., where he is involved in the design of encryption systems and wireless networks, intrusion detection, and data breach tracking, as well as providing planning and development advice for IT departments concerning contingency planning.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.