Cargando…

Cybersecurity: managing systems, conducting testing, and investigating intrusions

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security...

Descripción completa

Detalles Bibliográficos
Autor principal: Mowbray, Thomas J
Lenguaje:eng
Publicado: Wiley 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/1625625
_version_ 1780933665626259456
author Mowbray, Thomas J
author_facet Mowbray, Thomas J
author_sort Mowbray, Thomas J
collection CERN
description A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usef
id cern-1625625
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Wiley
record_format invenio
spelling cern-16256252021-04-21T21:41:46Zhttp://cds.cern.ch/record/1625625engMowbray, Thomas JCybersecurity: managing systems, conducting testing, and investigating intrusionsComputing and Computers A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usefWileyoai:cds.cern.ch:16256252013
spellingShingle Computing and Computers
Mowbray, Thomas J
Cybersecurity: managing systems, conducting testing, and investigating intrusions
title Cybersecurity: managing systems, conducting testing, and investigating intrusions
title_full Cybersecurity: managing systems, conducting testing, and investigating intrusions
title_fullStr Cybersecurity: managing systems, conducting testing, and investigating intrusions
title_full_unstemmed Cybersecurity: managing systems, conducting testing, and investigating intrusions
title_short Cybersecurity: managing systems, conducting testing, and investigating intrusions
title_sort cybersecurity: managing systems, conducting testing, and investigating intrusions
topic Computing and Computers
url http://cds.cern.ch/record/1625625
work_keys_str_mv AT mowbraythomasj cybersecuritymanagingsystemsconductingtestingandinvestigatingintrusions