Cyber security a practitioner's guide

Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Sutton, David (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Swindon, UK BCS Learning & Development [2017]
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047674814
003 DE-627-1
005 20240228120318.0
007 cr uuu---uuuuu
008 191023s2017 xx |||||o 00| ||eng c
020 |a 9781780173436  |c electronic bk.  |9 978-1-78017-343-6 
020 |a 1780173431  |c electronic bk.  |9 1-78017-343-1 
020 |a 9781780173405  |9 978-1-78017-340-5 
035 |a (DE-627-1)047674814 
035 |a (DE-599)KEP047674814 
035 |a (ORHE)9781780173405 
035 |a (DE-627-1)047674814 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Sutton, David  |e VerfasserIn  |4 aut 
245 1 0 |a Cyber security  |b a practitioner's guide  |c David Sutton 
264 1 |a Swindon, UK  |b BCS Learning & Development  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017) 
520 |a Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author. 
650 0 |a Computer security 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Computer crimes 
650 2 |a Computer Security 
650 4 |a Sécurité informatique 
650 4 |a Surveillance des menaces informatiques 
650 4 |a Criminalité informatique 
650 4 |a COMPUTERS ; Data Processing 
650 4 |a Computer crimes 
650 4 |a Computer security 
650 4 |a Cyber intelligence (Computer security) 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781780173405/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047674814
_version_ 1818767297631748096
adam_text
any_adam_object
author Sutton, David
author_facet Sutton, David
author_role aut
author_sort Sutton, David
author_variant d s ds
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047674814
(DE-599)KEP047674814
(ORHE)9781780173405
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02658cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047674814</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120318.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780173436</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78017-343-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780173431</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78017-343-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780173405</subfield><subfield code="9">978-1-78017-340-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047674814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047674814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781780173405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047674814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security</subfield><subfield code="b">a practitioner's guide</subfield><subfield code="c">David Sutton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Swindon, UK</subfield><subfield code="b">BCS Learning &amp; Development</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781780173405/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047674814
illustrated Illustrated
indexdate 2024-12-18T08:47:39Z
institution BVB
isbn 9781780173436
1780173431
9781780173405
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher BCS Learning & Development
record_format marc
spelling Sutton, David VerfasserIn aut
Cyber security a practitioner's guide David Sutton
Swindon, UK BCS Learning & Development [2017]
©2017
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017)
Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author.
Computer security
Cyber intelligence (Computer security)
Computer crimes
Computer Security
Sécurité informatique
Surveillance des menaces informatiques
Criminalité informatique
COMPUTERS ; Data Processing
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781780173405/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Sutton, David
Cyber security a practitioner's guide
Computer security
Cyber intelligence (Computer security)
Computer crimes
Computer Security
Sécurité informatique
Surveillance des menaces informatiques
Criminalité informatique
COMPUTERS ; Data Processing
title Cyber security a practitioner's guide
title_auth Cyber security a practitioner's guide
title_exact_search Cyber security a practitioner's guide
title_full Cyber security a practitioner's guide David Sutton
title_fullStr Cyber security a practitioner's guide David Sutton
title_full_unstemmed Cyber security a practitioner's guide David Sutton
title_short Cyber security
title_sort cyber security a practitioner s guide
title_sub a practitioner's guide
topic Computer security
Cyber intelligence (Computer security)
Computer crimes
Computer Security
Sécurité informatique
Surveillance des menaces informatiques
Criminalité informatique
COMPUTERS ; Data Processing
topic_facet Computer security
Cyber intelligence (Computer security)
Computer crimes
Computer Security
Sécurité informatique
Surveillance des menaces informatiques
Criminalité informatique
COMPUTERS ; Data Processing
url https://learning.oreilly.com/library/view/-/9781780173405/?ar
work_keys_str_mv AT suttondavid cybersecurityapractitionersguide