Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

 
Paperback

Cybersecurity Design Principles

$64.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY!

In this book you will discover:

??Baseline Configuration, Diagrams & IP Management

Data Sovereignty & Data Loss Prevention

Data Masking, Tokenization & Digital Rights Management

Geographical Considerations & Cloud Access Security Broker

Secure Protocols, SSL Inspection & Hashing

API Gateways & Recovery Sites

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing

IaaS, PaaS & SaaS

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers

Microservices and APIs

Infrastructure as Code (IAC) & Software Defined Networking (SDN)

Service Integrations and Resource Policies

Environments, Provisioning & Deprovisioning

Integrity Measurement & Code Analysis

Security Automation, Monitoring & Validation

Software Diversity, Elasticity & Scalability

Directory Services, Federation & Attestation

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing

Deguassing, Purging & Wiping

Cryptographic Terminology and History

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators

BUY THIS BOOK NOW AND GET STARTED TODAY!

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Pastor Publishing Ltd
Date
5 January 2023
Pages
212
ISBN
9781839381829

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY!

In this book you will discover:

??Baseline Configuration, Diagrams & IP Management

Data Sovereignty & Data Loss Prevention

Data Masking, Tokenization & Digital Rights Management

Geographical Considerations & Cloud Access Security Broker

Secure Protocols, SSL Inspection & Hashing

API Gateways & Recovery Sites

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing

IaaS, PaaS & SaaS

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers

Microservices and APIs

Infrastructure as Code (IAC) & Software Defined Networking (SDN)

Service Integrations and Resource Policies

Environments, Provisioning & Deprovisioning

Integrity Measurement & Code Analysis

Security Automation, Monitoring & Validation

Software Diversity, Elasticity & Scalability

Directory Services, Federation & Attestation

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing

Deguassing, Purging & Wiping

Cryptographic Terminology and History

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators

BUY THIS BOOK NOW AND GET STARTED TODAY!

Read More
Format
Paperback
Publisher
Pastor Publishing Ltd
Date
5 January 2023
Pages
212
ISBN
9781839381829