- Paperback: 342 pages
- Publisher: Auerbach Publications; 1 edition (15 December 2010)
- Language: English
- ISBN-10: 1439851239
- ISBN-13: 978-1439851234
- Product Dimensions: 15.6 x 2 x 23.2 cm
- Average Customer Review: Be the first to review this item
- Amazon Bestsellers Rank: #7,77,478 in Books (See Top 100 in Books)
Cyber Security Essentials Paperback – 15 Dec 2010
Customers who bought this item also bought
About the Author
This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense® Security Intelligence Services; a business unit of VeriSign, Inc.
iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country’s business sectors.
iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").
For more information, please contact email@example.com.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter mobile phone number.
|5 star (0%)|
|4 star (0%)|
|3 star (0%)|
|2 star (0%)|
|1 star (0%)|
Most helpful customer reviews on Amazon.com
There is a lot between the covers of this book. And the executive editors are well aware. Consequently, they have presented the essays in the book so they can be read from start to finish, or as a “desktop reference” as the say in their own words:
“We don’t want you to read this from cover to cover. Go to the table of contents, pick a topic you are interested in, and understand it.”
Once you “understand it” you can then jump around, if you want to. I like that! And, the way the content is internally organized supports such an approach. Perhaps one of the best examples is the section on Basic Cryptography. The section contains the clearest and easiest to understand description of symmetric and asymmetric encryption as one might want to find. I suspect that may be one reason why “Cyber Security Essentials” can be found among the require course material at colleges and universities around the country who are teaching the subject. For those who might think their dissection of Public Key Encryption is too basic, they also dive, headfirst, without hesitation, into the RSA system, but with the caveat:
“While the math involved is somewhat cumbersome for the confines of this text, in essence the RSA process works as such . . .”
The math is then well explained, if indeed simplified, and referenced as well. If you like, you could check it yourself in the relevant iDefense Weekly Threat Report article, or even Rivest, Shamir, and Adleman’s own published work. I champion such an approach. For those who want more, they can use chapter and sections as launch points for further research and learning on their own. Still, even after putting the book down, I suspect many will come back to both reference and review the material covered, that includes, but is not limited to, the Domain Name System (DNS), Fraud Techniques, Exploitation Techniques, and Malicious Code. I already mentioned the Chapter on Defense and Analysis Techniques. But, also of value is the chapter listing iDefense Special File Investigation Tools for those of us who are cyber tool junkies!
I am looking forward to follow-on editions of “Cyber Security Essentials.” The very nature of the subject begs for it. Not a lecture, just an observation!
The one serious drawback to this book is that it is nothing more (and often a fair bit less) than a concatenation of 70 or so Wikipedia articles. One could save $60 by glancing at the table of contents and reading the top Google result for each one. The authors of this book don't add any insight, humor, or clarity to the material. As such, this book is a bound hard copy of remedial security information freely available and easily found online.