|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn732958481 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
100713s2011 inua ob 001 0 eng d |
010 |
|
|
|z 2010932423
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d CDX
|d B24X7
|d EBLCP
|d REDDC
|d OCLCQ
|d MERUC
|d DEBSZ
|d OCLCO
|d OCLCQ
|d DG1
|d IDEBK
|d YDXCP
|d OCLCF
|d OCLCQ
|d STF
|d HNK
|d N$T
|d DEBBG
|d OCLCQ
|d COO
|d OCLCQ
|d AZK
|d DG1
|d Z5A
|d MOR
|d LIP
|d PIFAG
|d ZCU
|d LIV
|d OCLCQ
|d U3W
|d OCLCA
|d OCLCQ
|d OCL
|d WRM
|d COCUF
|d NRAMU
|d ICG
|d INT
|d VT2
|d OCLCQ
|d WYU
|d OCLCQ
|d DKC
|d OCLCQ
|d UKCRE
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 723063859
|a 728836778
|a 768230324
|a 889012252
|a 961554548
|a 962624145
|a 988435398
|a 992092960
|a 1037679419
|a 1038684940
|a 1045565759
|a 1055394718
|a 1062995408
|a 1081283981
|a 1153462501
|a 1228617825
|
020 |
|
|
|a 9781118008317
|q (e-book)
|
020 |
|
|
|a 1118008316
|q (e-book)
|
020 |
|
|
|a 9781118008324
|q (e-book)
|
020 |
|
|
|a 1118008324
|q (e-book)
|
020 |
|
|
|a 9781118008331
|q (e-book)
|
020 |
|
|
|a 1118008332
|q (e-book)
|
020 |
|
|
|a 9781118255803
|q (electronic bk.)
|
020 |
|
|
|a 1118255801
|q (electronic bk.)
|
020 |
|
|
|z 9780470639559
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 0470639555
|q (pbk. ;
|q alk. paper)
|
029 |
1 |
|
|a AU@
|b 000053265818
|
029 |
1 |
|
|a AU@
|b 000055766172
|
029 |
1 |
|
|a CHNEW
|b 000614810
|
029 |
1 |
|
|a CHNEW
|b 000937914
|
029 |
1 |
|
|a CHVBK
|b 480182213
|
029 |
1 |
|
|a DEBBG
|b BV041909376
|
029 |
1 |
|
|a DEBBG
|b BV043393258
|
029 |
1 |
|
|a DEBBG
|b BV044154511
|
029 |
1 |
|
|a DEBSZ
|b 372800807
|
029 |
1 |
|
|a DEBSZ
|b 396995063
|
029 |
1 |
|
|a DEBSZ
|b 449241327
|
029 |
1 |
|
|a NZ1
|b 14256481
|
029 |
1 |
|
|a NZ1
|b 15871056
|
035 |
|
|
|a (OCoLC)732958481
|z (OCoLC)723063859
|z (OCoLC)728836778
|z (OCoLC)768230324
|z (OCoLC)889012252
|z (OCoLC)961554548
|z (OCoLC)962624145
|z (OCoLC)988435398
|z (OCoLC)992092960
|z (OCoLC)1037679419
|z (OCoLC)1038684940
|z (OCoLC)1045565759
|z (OCoLC)1055394718
|z (OCoLC)1062995408
|z (OCoLC)1081283981
|z (OCoLC)1153462501
|z (OCoLC)1228617825
|
037 |
|
|
|a 10.1002/9781118255803
|b Wiley InterScience
|n http://www3.interscience.wiley.com
|
050 |
|
4 |
|a QA76.9.A25
|b H6976 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Howard, Doug.
|
245 |
1 |
0 |
|a Security 2020 :
|b reduce security risks this decade /
|c Doug Howard and Kevin Prince.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley Pub.,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xxvi, 305 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20.
|
520 |
|
|
|a Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security
|x Forecasting.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sécurité informatique
|x Prévision.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Prince, Kevin.
|
758 |
|
|
|i has work:
|a Security 2020 (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGh8TyvXRgp6k88tmQbPQq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Howard, Doug.
|t Security 2020.
|b 1st ed.
|d Indianapolis, Ind. : Wiley Pub., ©2011
|w (DLC) 2010932423
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=694289
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH16072508
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00040805
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 17091409
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10469690
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 518174
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 294413
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 6820683
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7292994
|
994 |
|
|
|a 92
|b IZTAP
|