Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.
FEATURES
Presents descriptions for each type of cybersecurity technology and their specifications
Explains applications, usages, and offers case studies to enhance comprehension
Offers an easy-to-understand classification of existing cybersecurity technologies
Provides an understanding of the technologies without getting lost in technical details
Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies
This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.
FEATURES
Presents descriptions for each type of cybersecurity technology and their specifications
Explains applications, usages, and offers case studies to enhance comprehension
Offers an easy-to-understand classification of existing cybersecurity technologies
Provides an understanding of the technologies without getting lost in technical details
Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies
This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.