Salem Press
Back Search

SEARCH

Search
To search multiple titles Click Here
Salem Press
Copy Permalink to this Title to Clipboard

Principles of Cybersecurity

Table of Contents

Publisher’s Note




Introduction




Contributors




Aadhaar Hack




Access Control




Advanced Encryption Standard




Algorithm




Android OS




Anonymity and Anonymizers




Anonymous




Artificial Intelligence




Artificial Intelligence and Terrorism




Artificial Intelligence Cold War




Autonomous Cars




Big Data




Biometric Identification Systems




Blockchain




Bots




Browsers




Cambridge Analytica Facebook Data Scandal




Catfishing




Changing Passwords




China’s Cyberinvasion




Cloud Computing




Combinatorics




Computer and Technical Support Specialist




Computer Crime Investigation




Computer Fraud




Computer Fraud and Abuse Act




Computer Hardware Engineer




Computer Hardware Security




Computer Languages, Compilers, and Tools




Computer Memory and Storage




Computer Network Architect




Computer Networks




Computer Programmer




Computer Security




Computer Software




Computer Viruses and Worms




Cryptography




Cyber Command




Cyberbullying




Cybercrime




Cybercrime, Social Impacts of




Cybersecurity Basics




Cybersecurity Testing




Cyberterrorism




Cyberwarfare




Cyberweapon




Dark Web




Data Breach




Data Harvesting




Data Mining




Data Protection




Database




Database Design




Debugging




Deepfake




Demon Dialing/War Dialing




Device Drivers




Digital Forensics




Digital Watermarking




Doxing




E-banking




Electronic Bugs




Electronic Commerce Technology




Email and Business




Encryption




End-User Cybersecurity Education




Estonia Cyberattack




Fax Machine, Copier, and Printer Analysis




Firewalls




Firmware




Fuzzy Logic




Graphical User Interface




Hacking




HTML




HTTP Cookie




Identity Theft




ILOVEYOU Virus




Industrial Espionage




Information Security Analyst




Information Technology




Internet of Things




Internet Protocol




Internet Tracking and Tracing




Intrusion Detection and Prevention




iOS




Mac OS




Machine Learning




Malware




Marriott Starwood Hotels Hack




Metadata




Michelangelo Computer Virus




Microprocessor




Mobile Apps




Mobile Web Technology




Network and Computer Systems Administrator




Online Piracy




Operating System




Personal Computers




Phishing




Privacy Breaches




Privacy Rights




Privacy Settings




Public-Key Cryptography




Random-Access Memory




Ransomware




Risk Management




Russian Hacking Scandal




Servers




Smart City




Social Engineering




Software Developer/Quality Assurance Analyst/Tester




Spam




Spam Filters




Spyware




Stuxnet Virus




Systems Security Engineering




Targeted Advertising




Usability




Virtual Private Network




Web Developer




Windows Operating System




Wireless Networks




Workplace Monitoring




XML




Y2K Crisis




Zero Trust Security




Bibliography




Glossary




Organizations