Cyber security a practitioner's guide
Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Swindon, UK
BCS Learning & Development
[2017]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047674814 | ||
003 | DE-627-1 | ||
005 | 20240228120318.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781780173436 |c electronic bk. |9 978-1-78017-343-6 | ||
020 | |a 1780173431 |c electronic bk. |9 1-78017-343-1 | ||
020 | |a 9781780173405 |9 978-1-78017-340-5 | ||
035 | |a (DE-627-1)047674814 | ||
035 | |a (DE-599)KEP047674814 | ||
035 | |a (ORHE)9781780173405 | ||
035 | |a (DE-627-1)047674814 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sutton, David |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber security |b a practitioner's guide |c David Sutton |
264 | 1 | |a Swindon, UK |b BCS Learning & Development |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017) | ||
520 | |a Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer crimes | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Surveillance des menaces informatiques | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyber intelligence (Computer security) | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781780173405/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047674814 |
---|---|
_version_ | 1818767297631748096 |
adam_text | |
any_adam_object | |
author | Sutton, David |
author_facet | Sutton, David |
author_role | aut |
author_sort | Sutton, David |
author_variant | d s ds |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047674814 (DE-599)KEP047674814 (ORHE)9781780173405 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02658cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047674814</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120318.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780173436</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78017-343-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780173431</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78017-343-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780173405</subfield><subfield code="9">978-1-78017-340-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047674814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047674814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781780173405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047674814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security</subfield><subfield code="b">a practitioner's guide</subfield><subfield code="c">David Sutton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Swindon, UK</subfield><subfield code="b">BCS Learning & Development</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781780173405/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047674814 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:39Z |
institution | BVB |
isbn | 9781780173436 1780173431 9781780173405 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | BCS Learning & Development |
record_format | marc |
spelling | Sutton, David VerfasserIn aut Cyber security a practitioner's guide David Sutton Swindon, UK BCS Learning & Development [2017] ©2017 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed July 20, 2017) Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection. Essential reading for both businesses and individuals concerned with data protection; Addresses serious cyber threats and how to mitigate these to keep data secure; Written by an experienced information security professional and author. Computer security Cyber intelligence (Computer security) Computer crimes Computer Security Sécurité informatique Surveillance des menaces informatiques Criminalité informatique COMPUTERS ; Data Processing TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781780173405/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Sutton, David Cyber security a practitioner's guide Computer security Cyber intelligence (Computer security) Computer crimes Computer Security Sécurité informatique Surveillance des menaces informatiques Criminalité informatique COMPUTERS ; Data Processing |
title | Cyber security a practitioner's guide |
title_auth | Cyber security a practitioner's guide |
title_exact_search | Cyber security a practitioner's guide |
title_full | Cyber security a practitioner's guide David Sutton |
title_fullStr | Cyber security a practitioner's guide David Sutton |
title_full_unstemmed | Cyber security a practitioner's guide David Sutton |
title_short | Cyber security |
title_sort | cyber security a practitioner s guide |
title_sub | a practitioner's guide |
topic | Computer security Cyber intelligence (Computer security) Computer crimes Computer Security Sécurité informatique Surveillance des menaces informatiques Criminalité informatique COMPUTERS ; Data Processing |
topic_facet | Computer security Cyber intelligence (Computer security) Computer crimes Computer Security Sécurité informatique Surveillance des menaces informatiques Criminalité informatique COMPUTERS ; Data Processing |
url | https://learning.oreilly.com/library/view/-/9781780173405/?ar |
work_keys_str_mv | AT suttondavid cybersecurityapractitionersguide |