000 | 05392cam a2200937Ma 4500 | ||
---|---|---|---|
001 | ocn732958481 | ||
003 | OCoLC | ||
005 | 20240523125533.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 100713s2011 inua ob 001 0 eng d | ||
010 | _z 2010932423 | ||
040 |
_aE7B _beng _epn _cE7B _dOCLCQ _dCDX _dB24X7 _dEBLCP _dREDDC _dOCLCQ _dMERUC _dDEBSZ _dOCLCO _dOCLCQ _dDG1 _dIDEBK _dYDXCP _dOCLCF _dOCLCQ _dSTF _dHNK _dN$T _dDEBBG _dOCLCQ _dCOO _dOCLCQ _dAZK _dDG1 _dZ5A _dMOR _dLIP _dPIFAG _dZCU _dLIV _dOCLCQ _dU3W _dOCLCA _dOCLCQ _dOCL _dWRM _dCOCUF _dNRAMU _dICG _dINT _dVT2 _dOCLCQ _dWYU _dOCLCQ _dDKC _dOCLCQ _dUKCRE _dUKAHL _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a723063859 _a728836778 _a768230324 _a889012252 _a961554548 _a962624145 _a988435398 _a992092960 _a1037679419 _a1038684940 _a1045565759 _a1055394718 _a1062995408 _a1081283981 _a1153462501 _a1228617825 |
||
020 |
_a9781118008317 _q(e-book) |
||
020 |
_a1118008316 _q(e-book) |
||
020 |
_a9781118008324 _q(e-book) |
||
020 |
_a1118008324 _q(e-book) |
||
020 |
_a9781118008331 _q(e-book) |
||
020 |
_a1118008332 _q(e-book) |
||
020 |
_a9781118255803 _q(electronic bk.) |
||
020 |
_a1118255801 _q(electronic bk.) |
||
020 |
_z9780470639559 _q(pbk. ; _qalk. paper) |
||
020 |
_z0470639555 _q(pbk. ; _qalk. paper) |
||
029 | 1 |
_aAU@ _b000053265818 |
|
029 | 1 |
_aAU@ _b000055766172 |
|
029 | 1 |
_aCHNEW _b000614810 |
|
029 | 1 |
_aCHNEW _b000937914 |
|
029 | 1 |
_aCHVBK _b480182213 |
|
029 | 1 |
_aDEBBG _bBV041909376 |
|
029 | 1 |
_aDEBBG _bBV043393258 |
|
029 | 1 |
_aDEBBG _bBV044154511 |
|
029 | 1 |
_aDEBSZ _b372800807 |
|
029 | 1 |
_aDEBSZ _b396995063 |
|
029 | 1 |
_aDEBSZ _b449241327 |
|
029 | 1 |
_aNZ1 _b14256481 |
|
029 | 1 |
_aNZ1 _b15871056 |
|
035 |
_a(OCoLC)732958481 _z(OCoLC)723063859 _z(OCoLC)728836778 _z(OCoLC)768230324 _z(OCoLC)889012252 _z(OCoLC)961554548 _z(OCoLC)962624145 _z(OCoLC)988435398 _z(OCoLC)992092960 _z(OCoLC)1037679419 _z(OCoLC)1038684940 _z(OCoLC)1045565759 _z(OCoLC)1055394718 _z(OCoLC)1062995408 _z(OCoLC)1081283981 _z(OCoLC)1153462501 _z(OCoLC)1228617825 |
||
037 |
_a10.1002/9781118255803 _bWiley InterScience _nhttp://www3.interscience.wiley.com |
||
050 | 4 |
_aQA76.9.A25 _bH6976 2011eb |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _222 |
049 | _aMAIN | ||
100 | 1 | _aHoward, Doug. | |
245 | 1 | 0 |
_aSecurity 2020 : _breduce security risks this decade / _cDoug Howard and Kevin Prince. |
250 | _a1st ed. | ||
260 |
_aIndianapolis, Ind. : _bWiley Pub., _c�2011. |
||
300 |
_a1 online resource (xxvi, 305 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aPrint version record. | |
505 | 0 | _aSecurity 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20. | |
520 | _aIdentify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine. | ||
504 | _aIncludes bibliographical references and index. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer security _xForecasting. |
|
650 | 2 | _aComputer Security | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 |
_aS�ecurit�e informatique _xPr�evision. |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer security _2fast |
|
700 | 1 | _aPrince, Kevin. | |
758 |
_ihas work: _aSecurity 2020 (Text) _1https://id.oclc.org/worldcat/entity/E39PCGh8TyvXRgp6k88tmQbPQq _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aHoward, Doug. _tSecurity 2020. _b1st ed. _dIndianapolis, Ind. : Wiley Pub., �2011 _w(DLC) 2010932423 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |
938 |
_aAskews and Holts Library Services _bASKH _nAH16072508 |
||
938 |
_aBooks 24x7 _bB247 _nbks00040805 |
||
938 |
_aCoutts Information Services _bCOUT _n17091409 |
||
938 |
_aebrary _bEBRY _nebr10469690 |
||
938 |
_aEBSCOhost _bEBSC _n518174 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _n294413 |
||
938 |
_aYBP Library Services _bYANK _n6820683 |
||
938 |
_aYBP Library Services _bYANK _n7292994 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11658 _d11658 |