Understanding Cybersecurity Technologies

Understanding Cybersecurity Technologies

A Guide to Selecting the Right Cybersecurity Tools

Moallem, Abbas

Taylor & Francis Ltd

05/2024

202

Mole

9781032157849

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
1. Cybersecurity Technologies Classification 2. Encryption 3. Authentication 4. Biometrics 5. Firewall Technologies 6. Virus Detection 7. Phishing Detection 8. Endpoint Protection 9. Malware Protection Technology 10. The Internet of Things (IoT) 11. Network Security 12. Location Tracking 13. Surveillance 14. Insider Threat Protection 15. Intrusion Detection 16. Vulnerability Scanning 17. Penetration Testing 18. Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Id;Encryption;Antivirus;Virus Detection;Antivirus Software;Malware Detection;Phishing Detection;Blockchain;Ips;Email Security;Tcp;Compliance Monitoring;Web Application Firewall;Application Firewall;Biometric Systems;Phishing Attacks;Packet Filtering;IoT Device;SQL Injection;Network Security Technologies;Host Intrusion Prevention System;Violated;Hip;Pen Testing;Average Visit Duration;Endpoint Security;IoT Technology;Endpoint Protection;Location Tracking;Biometric Technologies;Id Technology