|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1040599402 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180615s2016 caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d OCLCF
|d TOH
|d MERER
|d OCLCQ
|d DEBBG
|d CEF
|d CNCEN
|d G3B
|d S9I
|d UAB
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1491956283
|
020 |
|
|
|a 9781491956281
|
020 |
|
|
|z 9781491956281
|
035 |
|
|
|a (OCoLC)1040599402
|
037 |
|
|
|a CL0500000972
|b Safari Books Online
|
050 |
|
4 |
|a HD30.38
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Peterson, Andrew,
|e author.
|
245 |
1 |
0 |
|a Cracking security misconceptions :
|b untangling common myths about modern information security /
|c Andrew Peterson.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed June 13, 2018).
|
520 |
|
|
|a As stories continue to mount about security breaches in organizations and government agencies--such as the 2016 US Department of Justice hack--many people believe there's really nothing they can do about it. Fact is, you can do quite a bit. In this report, security professional Andrew Peterson addresses several widespread misconceptions about the hacking world so that you can be better prepared to join the fight. You may believe hackers today are too clever and attacks are too sophisticated for you to do anything, or that your organization isn't worth a hacker's time. But that isn't the case. All organizations--from small, owner-operated businesses to large, multinational corporations--own data worth stealing and are potential, and even likely, targets for an attack. If you're ready to take security seriously, you need to involve everyone in the company, including security and non-security professionals alike. This report provides you with an accurate picture, rather than conjecture or half-truths propagated by the media.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492042747/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|