Cyberspace and cybersecurity / George Kostopoulos.
نوع المادة : نصالناشر:Boca Raton, Florida : CRC Press, 2018الطبعات:Second editionوصف:xxiv, 291 pages : illustrations, map ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9781138057715
- 1138057711
- TK5105.59 .K6787 2018
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .K6787 2018 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000027208 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .K6787 2018 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000027207 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.59 J33 2009 Introduction to network security / | TK5105.59 J33 2009 Introduction to network security / | TK5105.59 .J6512 2003 طقم ادوات مكافحة القراصنة / | TK5105.59 .K6787 2018 Cyberspace and cybersecurity / | TK5105.59 .K6787 2018 Cyberspace and cybersecurity / | TK5105.59 .L375 2019 CASP+ CompTIA advanced security practitioner certification all-in-one exam guide : (CAS-003) / | TK5105.59 .L375 2019 CASP+ CompTIA advanced security practitioner certification all-in-one exam guide : (CAS-003) / |
"Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management." -- Publisher's description.
Includes bibliographical references (pages 263-276)and index.
Vulnerabilities in information systems -- Vulnerabilities in the organization -- Risk in information system infrastructure -- Secure information systems -- Cybersecurity and the CIO -- Building a secure organization -- Cyberspace intrusions -- Cyberspace defense -- Cyberspace and the law -- Cyber warfare and homeland security -- Digital currencies.