Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.

Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Howard, Doug
Otros Autores: Prince, Kevin
Formato: eBook
Lenguaje:English
Publicado: Indianapolis, Ind. : Wiley Pub., ©2011.
Edición:1st ed.
Materias:
Acceso en línea:Click for online access

MARC

LEADER 00000cam a2200000Ma 4500
001 ocn732958481
003 OCoLC
005 20240504213016.0
006 m o d
007 cr cn|||||||||
008 100713s2011 inua ob 001 0 eng d
010 |z  2010932423 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d CDX  |d B24X7  |d EBLCP  |d REDDC  |d OCLCQ  |d MERUC  |d DEBSZ  |d OCLCO  |d OCLCQ  |d DG1  |d IDEBK  |d YDXCP  |d OCLCF  |d OCLCQ  |d STF  |d HNK  |d N$T  |d DEBBG  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d DG1  |d Z5A  |d MOR  |d LIP  |d PIFAG  |d ZCU  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d OCLCQ  |d OCL  |d WRM  |d COCUF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d DKC  |d OCLCQ  |d UKCRE  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 723063859  |a 728836778  |a 768230324  |a 889012252  |a 961554548  |a 962624145  |a 988435398  |a 992092960  |a 1037679419  |a 1038684940  |a 1045565759  |a 1055394718  |a 1062995408  |a 1081283981  |a 1153462501  |a 1228617825 
020 |a 9781118008317  |q (e-book) 
020 |a 1118008316  |q (e-book) 
020 |a 9781118008324  |q (e-book) 
020 |a 1118008324  |q (e-book) 
020 |a 9781118008331  |q (e-book) 
020 |a 1118008332  |q (e-book) 
020 |a 9781118255803  |q (electronic bk.) 
020 |a 1118255801  |q (electronic bk.) 
020 |z 9780470639559  |q (pbk. ;  |q alk. paper) 
020 |z 0470639555  |q (pbk. ;  |q alk. paper) 
035 |a (OCoLC)732958481  |z (OCoLC)723063859  |z (OCoLC)728836778  |z (OCoLC)768230324  |z (OCoLC)889012252  |z (OCoLC)961554548  |z (OCoLC)962624145  |z (OCoLC)988435398  |z (OCoLC)992092960  |z (OCoLC)1037679419  |z (OCoLC)1038684940  |z (OCoLC)1045565759  |z (OCoLC)1055394718  |z (OCoLC)1062995408  |z (OCoLC)1081283981  |z (OCoLC)1153462501  |z (OCoLC)1228617825 
037 |a 10.1002/9781118255803  |b Wiley InterScience  |n http://www3.interscience.wiley.com 
050 4 |a QA76.9.A25  |b H6976 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
049 |a HCDD 
100 1 |a Howard, Doug. 
245 1 0 |a Security 2020 :  |b reduce security risks this decade /  |c Doug Howard and Kevin Prince. 
250 |a 1st ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub.,  |c ©2011. 
300 |a 1 online resource (xxvi, 305 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20. 
520 |a Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine. 
504 |a Includes bibliographical references and index. 
650 0 |a Computer security. 
650 0 |a Computer security  |x Forecasting. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Prince, Kevin. 
758 |i has work:  |a Security 2020 (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGh8TyvXRgp6k88tmQbPQq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Howard, Doug.  |t Security 2020.  |b 1st ed.  |d Indianapolis, Ind. : Wiley Pub., ©2011  |w (DLC) 2010932423 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=694289  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD