My Account Log in

1 option

Attack Vectors : The History of Cybersecurity / by Morey Haber.

O'Reilly Online Learning: Academic/Public Library Edition Available online

O'Reilly Online Learning: Academic/Public Library Edition
Format:
Book
Author/Creator:
Haber, Morey.
Series:
Professional and Applied Computing Series
Language:
English
Subjects (All):
Computer security.
Data protection.
Physical Description:
1 online resource (306 pages)
Edition:
1st ed. 2025.
Place of Publication:
Berkeley, CA : Apress : Imprint: Apress, 2025.
Summary:
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You’ll Learn: Understand the history of cyber-security from the early 1950’s through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
Contents:
Chapter 1: The History of Attack Vectors
Chapter 2: Business Justification
Chapter 3: Definitions
Chapter 4: Malware
Chapter 5: Exploits
Chapter 6: Breaches
Chapter 7: Regulations
Chapter 8: People
Chapter 9: Syndicates
Chapter 10: Social Engineering
Chapter 11: Solutions
Chapter 12: The Human Threat
Chapter 13: Lateral Movement
Chapter 14: Return on Investment
Chapter 15: It’s Not If, But When
Chapter 16: Supply Chain Attacks
Chapter 17: Been Hacked?
Chapter 18: History Lesson
Chapter 19: Conclusion.
ISBN:
9798868817090
OCLC:
1547595889

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account