000 05392cam a2200937Ma 4500
001 ocn732958481
003 OCoLC
005 20240523125533.0
006 m o d
007 cr cn|||||||||
008 100713s2011 inua ob 001 0 eng d
010 _z 2010932423
040 _aE7B
_beng
_epn
_cE7B
_dOCLCQ
_dCDX
_dB24X7
_dEBLCP
_dREDDC
_dOCLCQ
_dMERUC
_dDEBSZ
_dOCLCO
_dOCLCQ
_dDG1
_dIDEBK
_dYDXCP
_dOCLCF
_dOCLCQ
_dSTF
_dHNK
_dN$T
_dDEBBG
_dOCLCQ
_dCOO
_dOCLCQ
_dAZK
_dDG1
_dZ5A
_dMOR
_dLIP
_dPIFAG
_dZCU
_dLIV
_dOCLCQ
_dU3W
_dOCLCA
_dOCLCQ
_dOCL
_dWRM
_dCOCUF
_dNRAMU
_dICG
_dINT
_dVT2
_dOCLCQ
_dWYU
_dOCLCQ
_dDKC
_dOCLCQ
_dUKCRE
_dUKAHL
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a723063859
_a728836778
_a768230324
_a889012252
_a961554548
_a962624145
_a988435398
_a992092960
_a1037679419
_a1038684940
_a1045565759
_a1055394718
_a1062995408
_a1081283981
_a1153462501
_a1228617825
020 _a9781118008317
_q(e-book)
020 _a1118008316
_q(e-book)
020 _a9781118008324
_q(e-book)
020 _a1118008324
_q(e-book)
020 _a9781118008331
_q(e-book)
020 _a1118008332
_q(e-book)
020 _a9781118255803
_q(electronic bk.)
020 _a1118255801
_q(electronic bk.)
020 _z9780470639559
_q(pbk. ;
_qalk. paper)
020 _z0470639555
_q(pbk. ;
_qalk. paper)
029 1 _aAU@
_b000053265818
029 1 _aAU@
_b000055766172
029 1 _aCHNEW
_b000614810
029 1 _aCHNEW
_b000937914
029 1 _aCHVBK
_b480182213
029 1 _aDEBBG
_bBV041909376
029 1 _aDEBBG
_bBV043393258
029 1 _aDEBBG
_bBV044154511
029 1 _aDEBSZ
_b372800807
029 1 _aDEBSZ
_b396995063
029 1 _aDEBSZ
_b449241327
029 1 _aNZ1
_b14256481
029 1 _aNZ1
_b15871056
035 _a(OCoLC)732958481
_z(OCoLC)723063859
_z(OCoLC)728836778
_z(OCoLC)768230324
_z(OCoLC)889012252
_z(OCoLC)961554548
_z(OCoLC)962624145
_z(OCoLC)988435398
_z(OCoLC)992092960
_z(OCoLC)1037679419
_z(OCoLC)1038684940
_z(OCoLC)1045565759
_z(OCoLC)1055394718
_z(OCoLC)1062995408
_z(OCoLC)1081283981
_z(OCoLC)1153462501
_z(OCoLC)1228617825
037 _a10.1002/9781118255803
_bWiley InterScience
_nhttp://www3.interscience.wiley.com
050 4 _aQA76.9.A25
_bH6976 2011eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
049 _aMAIN
100 1 _aHoward, Doug.
245 1 0 _aSecurity 2020 :
_breduce security risks this decade /
_cDoug Howard and Kevin Prince.
250 _a1st ed.
260 _aIndianapolis, Ind. :
_bWiley Pub.,
_c�2011.
300 _a1 online resource (xxvi, 305 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aPrint version record.
505 0 _aSecurity 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20.
520 _aIdentify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine.
504 _aIncludes bibliographical references and index.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aComputer security
_xForecasting.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aS�ecurit�e informatique
_xPr�evision.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_2fast
700 1 _aPrince, Kevin.
758 _ihas work:
_aSecurity 2020 (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGh8TyvXRgp6k88tmQbPQq
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aHoward, Doug.
_tSecurity 2020.
_b1st ed.
_dIndianapolis, Ind. : Wiley Pub., �2011
_w(DLC) 2010932423
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803
938 _aAskews and Holts Library Services
_bASKH
_nAH16072508
938 _aBooks 24x7
_bB247
_nbks00040805
938 _aCoutts Information Services
_bCOUT
_n17091409
938 _aebrary
_bEBRY
_nebr10469690
938 _aEBSCOhost
_bEBSC
_n518174
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_n294413
938 _aYBP Library Services
_bYANK
_n6820683
938 _aYBP Library Services
_bYANK
_n7292994
994 _a92
_bINLUM
999 _c11658
_d11658