TY - BOOK AU - Howard,Doug AU - Prince,Kevin TI - Security 2020: reduce security risks this decade SN - 9781118008317 AV - QA76.9.A25 H6976 2011eb U1 - 005.8 22 PY - 2011/// CY - Indianapolis, Ind. PB - Wiley Pub. KW - Computer security KW - Forecasting KW - Computer Security KW - S�ecurit�e informatique KW - Pr�evision KW - COMPUTERS KW - Internet KW - Security KW - bisacsh KW - Networking KW - General KW - fast N1 - Includes bibliographical references and index; Security 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20 N2 - Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine UR - https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 ER -