Cargando…

Big breaches : cybersecurity lessons for everyone /

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone -- not just techies -- to become informed and empowered on the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Daswani, Neil (Autor), Elbayadi, Moudy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley] : Apress, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1239962713
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 210226s2021 cau o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d EBLCP  |d GW5XE  |d OCLCO  |d N$T  |d OCLCF  |d SNK  |d UKAHL  |d FCX  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d COM  |d OCLCO  |d CHK  |d OCLCQ  |d OCLCO 
019 |a 1241451019 
020 |a 9781484266557  |q (electronic bk.) 
020 |a 1484266552  |q (electronic bk.) 
020 |z 1484266544 
020 |z 9781484266540 
024 7 |a 10.1007/978-1-4842-6655-7  |2 doi 
029 1 |a AU@  |b 000068785482 
029 1 |a AU@  |b 000069346989 
035 |a (OCoLC)1239962713  |z (OCoLC)1241451019 
050 4 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Daswani, Neil,  |e author. 
245 1 0 |a Big breaches :  |b cybersecurity lessons for everyone /  |c Neil Daswani, Moudy Elbayadi. 
264 1 |a [Berkeley] :  |b Apress,  |c [2021] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone -- not just techies -- to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. 
505 0 |a Part 1: The Biggest Breaches -- Chapter 1: The Root Causes of Data Breaches -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Advice to Cybersecurity Investors -- Chapter 15: Advice to Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed March 29, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Case studies. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |v Études de cas. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Data protection  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Case studies  |2 fast 
655 7 |a Case studies.  |2 lcgft 
655 7 |a Études de cas.  |2 rvmgf 
700 1 |a Elbayadi, Moudy.,  |e author. 
776 0 8 |i Print version:  |z 1484266544  |z 9781484266540  |w (OCoLC)1201386520 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484266557/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38382976 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6508443 
938 |a EBSCOhost  |b EBSC  |n 2759180 
938 |a YBP Library Services  |b YANK  |n 301953659 
994 |a 92  |b IZTAP