Книга: Edward Amoroso «Cyber Attacks»

Cyber Attacks

Производитель: "Неизвестный"

Cyber Attacks ISBN:9780123849175

Издательство: "Неизвестный" (2010)

ISBN: 9780123849175

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги
MacDonnell UlschCyber Threat!. How to Manage the Growing Risk of Cyber AttacksConquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
3251.98электронная книга
Andrew CoburnSolving Cyber Risk. Protecting Your Company and SocietyThe non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
3898.47электронная книга
Igor BernikCybercrime and Cyber WarfareIn order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace… — John Wiley&Sons Limited, электронная книга Подробнее...
7878.89электронная книга
Bruce SchneierCarry On. Sound Advice from Schneier on SecurityUp-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
1950.53электронная книга
Man Rhee YoungWireless Mobile Internet SecurityThe mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with… — John Wiley&Sons Limited, электронная книга Подробнее...
10380.3электронная книга
Michael DooleyDNS Security ManagementAn advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an… — John Wiley&Sons Limited, электронная книга Подробнее...
8108.47электронная книга
Brian Bennett T.Understanding, Assessing, and Responding to Terrorism. Protecting Critical Infrastructure and PersonnelA comprehensive guide to understanding, assessing, and responding to terrorism in this modern age This book provides readers with a thorough understanding of the types of attacks that may be… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
11707.11электронная книга
Adam YoungMalicious Cryptography. Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning… — John Wiley&Sons Limited (USD), электронная книга Подробнее...
2926.78электронная книга
Ted G. Lewis, PhD.Critical Infrastructure Protection in Homeland Security. Defending a Networked Nation"…excellent for use as a text in information assurance or cyber-security courses…I strongly advocate that professors…examine this book with the intention of using it in their programs."… — John Wiley&Sons Limited, электронная книга Подробнее...
9575.15электронная книга
Thomas Mowbray J.Cybersecurity. Managing Systems, Conducting Testing, and Investigating IntrusionsA must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of… — John Wiley&Sons Limited, электронная книга Подробнее...
4632.99электронная книга

См. также в других словарях:

  • 2008 cyber-attacks on Georgia and Azerbaijan — The Cyberattacks on Georgia and Azerbaijan were a series of cyber attacks that began August 9, 2008 [http://www.stupidsheeple.com/index.php/2008081036/latest/russian cyber attacks georgia.html] and swamped websites of Georgian… …   Wikipedia

  • Cyber-warfare — (also known as cybernetic war [Jonathan V. Post, Cybernetic War, Omni, May 1979, pp.44 104, reprinted The Omni Book of Computers Robots , Zebra Books, ISBN 0 8217 1276] , or cyberwar ) is the use of computers and the Internet in conducting… …   Wikipedia

  • Cyber security standards — are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. These guides provide general outlines as well as specific techniques for implementing cyber… …   Wikipedia

  • Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… …   Wikipedia

  • Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… …   Wikipedia

  • Cyber War — Zweiter Weltkrieg: Frankreich. Nachrichtenhelferinnen an Vermittlungspult/Telefonanlage: PK KBK Lw zbV (Deutsche Wehrmacht; Bild: Bundesarchiv) Cyberwar ist ein Kofferwort aus den englischen Wörtern …   Deutsch Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»