عرض عادي

Cyberspace and cybersecurity / George Kostopoulos.

بواسطة:نوع المادة : نصنصالناشر:Boca Raton, Florida : CRC Press, 2018الطبعات:Second editionوصف:xxiv, 291 pages : illustrations, map ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781138057715
  • 1138057711
الموضوع:تصنيف مكتبة الكونجرس:
  • TK5105.59 .K6787 2018
المحتويات:
Vulnerabilities in information systems -- Vulnerabilities in the organization -- Risk in information system infrastructure -- Secure information systems -- Cybersecurity and the CIO -- Building a secure organization -- Cyberspace intrusions -- Cyberspace defense -- Cyberspace and the law -- Cyber warfare and homeland security -- Digital currencies.
ملخص:"Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management." -- Publisher's description.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 .K6787 2018 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000027208
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة TK5105.59 .K6787 2018 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30020000027207

"Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management." -- Publisher's description.

Includes bibliographical references (pages 263-276)and index.

Vulnerabilities in information systems -- Vulnerabilities in the organization -- Risk in information system infrastructure -- Secure information systems -- Cybersecurity and the CIO -- Building a secure organization -- Cyberspace intrusions -- Cyberspace defense -- Cyberspace and the law -- Cyber warfare and homeland security -- Digital currencies.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة