Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Big breaches = cybersecurity lessons...
~
Elbayadi, Moudy.
Linked to FindBook
Google Book
Amazon
博客來
Big breaches = cybersecurity lessons for everyone /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Big breaches/ by Neil Daswani, Moudy Elbayadi.
Reminder of title:
cybersecurity lessons for everyone /
Author:
Daswani, Neil.
other author:
Elbayadi, Moudy.
Published:
Berkeley, CA :Apress : : 2021.,
Description:
xlvii, 427 p. :ill., digital ;24 cm.
[NT 15003449]:
Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.
Contained By:
Springer Nature eBook
Subject:
Computer security - Case studies. -
Online resource:
https://doi.org/10.1007/978-1-4842-6655-7
ISBN:
9781484266557
Big breaches = cybersecurity lessons for everyone /
Daswani, Neil.
Big breaches
cybersecurity lessons for everyone /[electronic resource] :by Neil Daswani, Moudy Elbayadi. - Berkeley, CA :Apress :2021. - xlvii, 427 p. :ill., digital ;24 cm.
Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.
ISBN: 9781484266557
Standard No.: 10.1007/978-1-4842-6655-7doiSubjects--Topical Terms:
1001092
Computer security
--Case studies.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Big breaches = cybersecurity lessons for everyone /
LDR
:01894nmm a2200313 a 4500
001
2238632
003
DE-He213
005
20210618140348.0
006
m d
007
cr nn 008maaau
008
211111s2021 cau s 0 eng d
020
$a
9781484266557
$q
(electronic bk.)
020
$a
9781484266540
$q
(paper)
024
7
$a
10.1007/978-1-4842-6655-7
$2
doi
035
$a
978-1-4842-6655-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D231 2021
100
1
$a
Daswani, Neil.
$3
622668
245
1 0
$a
Big breaches
$h
[electronic resource] :
$b
cybersecurity lessons for everyone /
$c
by Neil Daswani, Moudy Elbayadi.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
xlvii, 427 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.
650
0
$a
Computer security
$v
Case studies.
$3
1001092
650
1 4
$a
Security.
$3
3134865
700
1
$a
Elbayadi, Moudy.
$3
3491910
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6655-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9400517
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login