Книга: Edward Amoroso «Cyber Attacks»
Производитель: "Неизвестный" Cyber Attacks ISBN:9780123849175 Издательство: "Неизвестный" (2010)
ISBN: 9780123849175 |
Другие книги схожей тематики:
Автор | Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|---|
MacDonnell Ulsch | Cyber Threat!. How to Manage the Growing Risk of Cyber Attacks | Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 3251.98 | электронная книга | |
Andrew Coburn | Solving Cyber Risk. Protecting Your Company and Society | The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 3898.47 | электронная книга | |
Igor Bernik | Cybercrime and Cyber Warfare | In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace… — John Wiley&Sons Limited, электронная книга Подробнее... | 7878.89 | электронная книга | |
Bruce Schneier | Carry On. Sound Advice from Schneier on Security | Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 1950.53 | электронная книга | |
Man Rhee Young | Wireless Mobile Internet Security | The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with… — John Wiley&Sons Limited, электронная книга Подробнее... | 10380.3 | электронная книга | |
Michael Dooley | DNS Security Management | An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an… — John Wiley&Sons Limited, электронная книга Подробнее... | 8108.47 | электронная книга | |
Brian Bennett T. | Understanding, Assessing, and Responding to Terrorism. Protecting Critical Infrastructure and Personnel | A comprehensive guide to understanding, assessing, and responding to terrorism in this modern age This book provides readers with a thorough understanding of the types of attacks that may be… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 11707.11 | электронная книга | |
Adam Young | Malicious Cryptography. Exposing Cryptovirology | Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 2926.78 | электронная книга | |
Ted G. Lewis, PhD. | Critical Infrastructure Protection in Homeland Security. Defending a Networked Nation | "…excellent for use as a text in information assurance or cyber-security courses…I strongly advocate that professors…examine this book with the intention of using it in their programs."… — John Wiley&Sons Limited, электронная книга Подробнее... | 9575.15 | электронная книга | |
Thomas Mowbray J. | Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions | A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of… — John Wiley&Sons Limited, электронная книга Подробнее... | 4632.99 | электронная книга |
См. также в других словарях:
2008 cyber-attacks on Georgia and Azerbaijan — The Cyberattacks on Georgia and Azerbaijan were a series of cyber attacks that began August 9, 2008 [http://www.stupidsheeple.com/index.php/2008081036/latest/russian cyber attacks georgia.html] and swamped websites of Georgian… … Wikipedia
Cyber-warfare — (also known as cybernetic war [Jonathan V. Post, Cybernetic War, Omni, May 1979, pp.44 104, reprinted The Omni Book of Computers Robots , Zebra Books, ISBN 0 8217 1276] , or cyberwar ) is the use of computers and the Internet in conducting… … Wikipedia
Cyber security standards — are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. These guides provide general outlines as well as specific techniques for implementing cyber… … Wikipedia
Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… … Wikipedia
Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… … Wikipedia
Cyber War — Zweiter Weltkrieg: Frankreich. Nachrichtenhelferinnen an Vermittlungspult/Telefonanlage: PK KBK Lw zbV (Deutsche Wehrmacht; Bild: Bundesarchiv) Cyberwar ist ein Kofferwort aus den englischen Wörtern … Deutsch Wikipedia