NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince.

By: Contributor(s): Material type: TextPublication details: Indianapolis, Ind. : Wiley Pub., �2011.Edition: 1st edDescription: 1 online resource (xxvi, 305 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781118008317
  • 1118008316
  • 9781118008324
  • 1118008324
  • 9781118008331
  • 1118008332
  • 9781118255803
  • 1118255801
Subject(s): Additional physical formats: Print version:: Security 2020.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 H6976 2011eb
Online resources:
Contents:
Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20.
Summary: Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Print version record.

Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20.

Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine.

Includes bibliographical references and index.

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.