|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
JSTOR_on1322476491 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220602t20222022enk ob 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d JSTOR
|d OCLCF
|d YDX
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781787783669
|q (electronic bk.)
|
020 |
|
|
|a 1787783669
|q (electronic bk.)
|
020 |
|
|
|a 9781787783676
|q (electronic bk.)
|
020 |
|
|
|a 1787783677
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000072056084
|
035 |
|
|
|a (OCoLC)1322476491
|
037 |
|
|
|a 9781787783676
|b O'Reilly Media
|
037 |
|
|
|a 22573/ctv2hqhg5c
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b H53 2022
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220602
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hibberd, Gary,
|e author.
|
245 |
1 |
4 |
|a The art of cyber security :
|b a practical guide to winning the war on cyber crime /
|c Gary Hibberd.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a Cambridgeshire :
|b IT Governance Publishing,
|c 2022.
|
264 |
|
4 |
|c ©2022
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on October 21, 2022).
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv2hqrdb4
|z Texto completo
|
994 |
|
|
|a 92
|b IZTAP
|