Cargando…

Cyber crime, security and digital intelligence /

"Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From ins...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Johnson, Mark, 1959-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Farnham, Surrey : Gower Pub. Ltd., 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBSCO_ocn854569624
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 130314s2013 enka ob 001 0 eng d
010 |z  2013008805 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d OCLCO  |d B24X7  |d STF  |d YDXCP  |d OCLCF  |d COO  |d N$T  |d OCLCQ  |d BWS  |d IDEBK  |d OCLCQ  |d MOR  |d JBG  |d AGLDB  |d OCLCQ  |d YDX  |d DEBSZ  |d U3W  |d OCLCA  |d D6H  |d VTS  |d INT  |d REC  |d OCLCQ  |d WYU  |d LVT  |d OCLCQ  |d UKAHL  |d UKCRE  |d VLY  |d BRF  |d INARC  |d SFB  |d OCLCO  |d ELBRO  |d OCLCQ  |d OCLCO 
019 |a 913963129  |a 966374232  |a 1000456986  |a 1005454775  |a 1017995298  |a 1028762597  |a 1049691423  |a 1053489343  |a 1076684358  |a 1087392413  |a 1096219253  |a 1153475924  |a 1162231372  |a 1175272750  |a 1241771557  |a 1259205911  |a 1260360743  |a 1300464722  |a 1330980618 
020 |a 9781409454502  |q (electronic bk.) 
020 |a 1409454509  |q (electronic bk.) 
020 |a 9781472403650  |q (electronic bk.) 
020 |a 1472403657  |q (electronic bk.) 
020 |z 9781409454496  |q (hardback ;  |q alk. paper) 
020 |z 1409454495  |q (hbk.) 
020 |a 1317155351 
020 |a 9781317155355 
020 |a 1317155343 
020 |a 9781317155348 
020 |a 9781315575667  |q (electronic bk.) 
020 |a 1315575663  |q (electronic bk.) 
029 1 |a AU@  |b 000053310669 
029 1 |a AU@  |b 000060909794 
029 1 |a DEBBG  |b BV042739713 
029 1 |a DEBBG  |b BV043787255 
029 1 |a DEBSZ  |b 446487805 
029 1 |a DEBSZ  |b 472794248 
029 1 |a DEBSZ  |b 493124896 
035 |a (OCoLC)854569624  |z (OCoLC)913963129  |z (OCoLC)966374232  |z (OCoLC)1000456986  |z (OCoLC)1005454775  |z (OCoLC)1017995298  |z (OCoLC)1028762597  |z (OCoLC)1049691423  |z (OCoLC)1053489343  |z (OCoLC)1076684358  |z (OCoLC)1087392413  |z (OCoLC)1096219253  |z (OCoLC)1153475924  |z (OCoLC)1162231372  |z (OCoLC)1175272750  |z (OCoLC)1241771557  |z (OCoLC)1259205911  |z (OCoLC)1260360743  |z (OCoLC)1300464722  |z (OCoLC)1330980618 
050 4 |a HV6773  |b .J64 2013eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Johnson, Mark,  |d 1959- 
245 1 0 |a Cyber crime, security and digital intelligence /  |c Mark Johnson. 
260 |a Farnham, Surrey :  |b Gower Pub. Ltd.,  |c 2013. 
300 |a 1 online resource (xlv, 252 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security. 
520 |a "Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer crimes. 
650 0 |a Cyberterrorism. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Criminalité informatique. 
650 6 |a Cyberterrorisme. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
776 0 8 |i Print version:  |a Johnson, Mark, 1959-  |t Cyber crime, security and digital intelligence.  |d Farnham, Surrey : Gower Pub. Ltd., 2013  |w (DLC) 2013008805 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740  |z Texto completo 
938 |a eLibro  |b ELBO  |n ELB159821 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25460083 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30655488 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30655489 
938 |a Books 24x7  |b B247  |n bks00064432 
938 |a ebrary  |b EBRY  |n ebr10727501 
938 |a EBSCOhost  |b EBSC  |n 559740 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34493276 
938 |a YBP Library Services  |b YANK  |n 10697543 
938 |a YBP Library Services  |b YANK  |n 14866177 
938 |a Internet Archive  |b INAR  |n cybercr_joh_xxxx_00_0084 
994 |a 92  |b IZTAP