Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!