Cargando…

Security 2020 : reduce security risks this decade /

Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Howard, Doug
Otros Autores: Prince, Kevin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Pub., ©2011.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn732958481
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 100713s2011 inua ob 001 0 eng d
010 |z  2010932423 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d CDX  |d B24X7  |d EBLCP  |d REDDC  |d OCLCQ  |d MERUC  |d DEBSZ  |d OCLCO  |d OCLCQ  |d DG1  |d IDEBK  |d YDXCP  |d OCLCF  |d OCLCQ  |d STF  |d HNK  |d N$T  |d DEBBG  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d DG1  |d Z5A  |d MOR  |d LIP  |d PIFAG  |d ZCU  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d OCLCQ  |d OCL  |d WRM  |d COCUF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d DKC  |d OCLCQ  |d UKCRE  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 723063859  |a 728836778  |a 768230324  |a 889012252  |a 961554548  |a 962624145  |a 988435398  |a 992092960  |a 1037679419  |a 1038684940  |a 1045565759  |a 1055394718  |a 1062995408  |a 1081283981  |a 1153462501  |a 1228617825 
020 |a 9781118008317  |q (e-book) 
020 |a 1118008316  |q (e-book) 
020 |a 9781118008324  |q (e-book) 
020 |a 1118008324  |q (e-book) 
020 |a 9781118008331  |q (e-book) 
020 |a 1118008332  |q (e-book) 
020 |a 9781118255803  |q (electronic bk.) 
020 |a 1118255801  |q (electronic bk.) 
020 |z 9780470639559  |q (pbk. ;  |q alk. paper) 
020 |z 0470639555  |q (pbk. ;  |q alk. paper) 
029 1 |a AU@  |b 000053265818 
029 1 |a AU@  |b 000055766172 
029 1 |a CHNEW  |b 000614810 
029 1 |a CHNEW  |b 000937914 
029 1 |a CHVBK  |b 480182213 
029 1 |a DEBBG  |b BV041909376 
029 1 |a DEBBG  |b BV043393258 
029 1 |a DEBBG  |b BV044154511 
029 1 |a DEBSZ  |b 372800807 
029 1 |a DEBSZ  |b 396995063 
029 1 |a DEBSZ  |b 449241327 
029 1 |a NZ1  |b 14256481 
029 1 |a NZ1  |b 15871056 
035 |a (OCoLC)732958481  |z (OCoLC)723063859  |z (OCoLC)728836778  |z (OCoLC)768230324  |z (OCoLC)889012252  |z (OCoLC)961554548  |z (OCoLC)962624145  |z (OCoLC)988435398  |z (OCoLC)992092960  |z (OCoLC)1037679419  |z (OCoLC)1038684940  |z (OCoLC)1045565759  |z (OCoLC)1055394718  |z (OCoLC)1062995408  |z (OCoLC)1081283981  |z (OCoLC)1153462501  |z (OCoLC)1228617825 
037 |a 10.1002/9781118255803  |b Wiley InterScience  |n http://www3.interscience.wiley.com 
050 4 |a QA76.9.A25  |b H6976 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Howard, Doug. 
245 1 0 |a Security 2020 :  |b reduce security risks this decade /  |c Doug Howard and Kevin Prince. 
250 |a 1st ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub.,  |c ©2011. 
300 |a 1 online resource (xxvi, 305 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20. 
520 |a Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine. 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Computer security  |x Forecasting. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Sécurité informatique  |x Prévision. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Prince, Kevin. 
758 |i has work:  |a Security 2020 (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGh8TyvXRgp6k88tmQbPQq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Howard, Doug.  |t Security 2020.  |b 1st ed.  |d Indianapolis, Ind. : Wiley Pub., ©2011  |w (DLC) 2010932423 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=694289  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16072508 
938 |a Books 24x7  |b B247  |n bks00040805 
938 |a Coutts Information Services  |b COUT  |n 17091409 
938 |a ebrary  |b EBRY  |n ebr10469690 
938 |a EBSCOhost  |b EBSC  |n 518174 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 294413 
938 |a YBP Library Services  |b YANK  |n 6820683 
938 |a YBP Library Services  |b YANK  |n 7292994 
994 |a 92  |b IZTAP