Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Cyber security essentialsCyber security essentials

Cyber security essentials

James Graham, Ryan Olson, Richard Howard

About this book

"A collection of intelligence and security articles, this book covers common security terms and vulnerabilities that security and IT personnel need to know in order to guard their systems. Topics discussed include Stack Based Buffer Overflows, Malware Naming, Fast-Flux, SQL Injection, and Format String Vulnerability. The book explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, descriptions that are easy to read and comprehend. The author provides actionable advice on how to mitigate each vulnerability, helping to enable a proactive response to threats and attacks"--

Details

OL Work ID
OL16211821W

Subjects

BUSINESS & ECONOMICS / ManagementCOMPUTERS / Security / GeneralCOMPUTERS / Information TechnologyComputer security

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.