Cargando…

Cyberspace and Cybersecurity, Second Edition.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kostopoulos, George
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : CRC Press, 2017.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1009312761
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 171104s2017 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d IDB  |d OCLCQ  |d IAT  |d AU@  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d OCLCF  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
020 |a 9781351651653 
020 |a 135165165X 
029 1 |a AU@  |b 000062540303 
035 |a (OCoLC)1009312761 
050 4 |a TK5105.59  |b .K6787 2018eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Kostopoulos, George. 
245 1 0 |a Cyberspace and Cybersecurity, Second Edition. 
250 |a 2nd ed. 
260 |a London :  |b CRC Press,  |c 2017. 
300 |a 1 online resource (316 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- The Modern World -- Purpose and Audience -- The Book -- Acknowledgments -- Author -- Chapter 1: Vulnerabilities in Information Systems -- Introduction -- Causes of Vulnerability -- Measuring Vulnerability -- Avoiding Vulnerabilities through Secure Coding -- Mistakes Can Be Good -- Threats Classification -- Threat Modeling Process -- Security Starts at Home -- Security in Applications -- Introducing Countermeasures 
505 8 |a International Awareness Exercises -- Chapter 2: Vulnerabilities in the Organization -- Introduction -- Common Organizational Vulnerabilities -- Access Authorization and Authentication -- Human Factors -- Security Services -- External Technologies -- Vulnerabilities in Networks -- Wireless Networks -- Bluetooth -- Passive Vulnerabilities -- Active Vulnerabilities -- Precautions -- Wireless Fidelity -- Wi-Fi Precautions at Home -- Wi-Fi Precautions at the Hotspot -- Wi-Fi Precautions at the Enterprise 
505 8 |a Worldwide Interoperability Microwave Access WiMAX Features -- Cloud Computing -- Internet of Things -- Automotive Cybersecurity -- Vulnerability Assessment Tools -- Exercises -- Chapter 3: Risks in Information Systems Infrastructure -- Introduction -- Risks in Hardware -- Risks in Software -- Risks in People -- Risks in Laptops -- Risks in Cyberspace -- Risks in Legacy Infrastructure -- Risks in Mobile Telephony -- Risk Insurance in Cyberspace -- Exercises -- Chapter 4: Secure Information Systems -- Introduction 
505 8 |a Assets Identification Assets Communication -- Assets Storage -- Resource Access Control Facility -- Securing the Email Communications -- Email Server Side -- Email Client Side -- Information Security Management -- Encryption Options in Emails -- Steganography -- Exercises -- Chapter 5: Cybersecurity and the CIO -- Introduction -- CIO: Personality -- Trust and Ethics -- Communication and Intelligence -- Leadership and Entrepreneurship -- Courage and Limitations -- CIO: Education -- University Degrees -- Certifications 
505 8 |a Continuing Education and Skills Acquisition CIO: Experience -- CIO: Responsibilities -- Data Backup and Archiving -- Culture of Security -- Cyber Training -- Contingency Plans -- Liability -- CIO: Information Security -- Internal Information Security Components -- Access Controlâ#x80;#x94;Electronic Here, we have three questions: Who? What? How? Sometimes one more question is added: When? Todayâ#x80;#x99;s database systems allow access control down to the cell of a spreadsheet. Programming security to that level might be tedious, but 
505 8 |a ""Access Controlâ#x80;#x94;Physical In an enterprise, it is often the case where access is granted for specific areas of the facilities. In such cases, combination locks or card swiping devices allow authorized access. In the former case, the drawback is possible los"" 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Cyberspace  |x Security measures. 
650 7 |a Cyberspace  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Kostopoulos, George.  |t Cyberspace and Cybersecurity, Second Edition.  |d London : CRC Press, ©2017  |z 9781138057715 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5110029  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5110029 
994 |a 92  |b IZTAP