Cyber security : the complete guide to cyber threats and protection /
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Swindon :
BCS, The Chartered Institute for IT,
[2022]
|
Edition: | Second edition. |
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000nam a22000007i 4500 | ||
---|---|---|---|
001 | in00006288295 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 221129s2022 enka ob 001 0 eng d | ||
005 | 20221208163053.6 | ||
035 | |a 1WRLDSHRon1351999012 | ||
040 | |a ORMDA |b eng |e rda |e pn |c ORMDA | ||
020 | |a 9781780175973 |q (electronic bk.) | ||
020 | |a 1780175973 |q (electronic bk.) | ||
035 | |a (OCoLC)1351999012 | ||
037 | |a 9781780175973 |b O'Reilly Media | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8 |2 23/eng/20221129 |
049 | |a TXMM | ||
100 | 1 | |a Sutton, David |c (Information security practitioner), |e author. | |
245 | 1 | 0 | |a Cyber security : |b the complete guide to cyber threats and protection / |c David Sutton. |
250 | |a Second edition. | ||
264 | 1 | |a Swindon : |b BCS, The Chartered Institute for IT, |c [2022] | |
300 | |a 1 online resource (222 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. | ||
590 | 0 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer crimes. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781780175973/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 4ab704f0-b717-49d3-8ba6-521768bb92dc |i fb3b140e-81cf-4fd3-8f77-00ecffb03166 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e QA76.9.A25 |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781780175973/?ar |z CONNECT |