|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn994222999 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170721s2017 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d STF
|d TOH
|d N$T
|d COH
|d OCLCA
|d CEF
|d KSU
|d OCLCQ
|d OCLCO
|d IGB
|d AUW
|d BTN
|d MHW
|d INTCL
|d SNK
|d AU@
|d A6Q
|d S8I
|d S8J
|d OCLCQ
|d AGLDB
|d G3B
|d D6H
|d OCLCQ
|d SOE
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9781780173436
|q (electronic bk.)
|
020 |
|
|
|a 1780173431
|q (electronic bk.)
|
020 |
|
|
|z 9781780173405
|
020 |
|
|
|z 1780173407
|
029 |
1 |
|
|a GBVCP
|b 100486230X
|
029 |
1 |
|
|a AU@
|b 000070274132
|
035 |
|
|
|a (OCoLC)994222999
|
037 |
|
|
|a CL0500000877
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b S88 2017eb
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sutton, David
|c (Information security practitioner),
|e author.
|
245 |
1 |
0 |
|a Cyber security :
|b a practitioner's guide /
|c David Sutton.
|
264 |
|
1 |
|a Swindon, UK :
|b BCS Learning & Development,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed July 20, 2017).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Surveillance des menaces informatiques.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|0 (OCoLC)fst01893401
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781780173405/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1501522
|
994 |
|
|
|a 92
|b IZTAP
|