Cargando…
Cybersecurity: managing systems, conducting testing, and investigating intrusions
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1625625 |
_version_ | 1780933665626259456 |
---|---|
author | Mowbray, Thomas J |
author_facet | Mowbray, Thomas J |
author_sort | Mowbray, Thomas J |
collection | CERN |
description | A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usef |
id | cern-1625625 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Wiley |
record_format | invenio |
spelling | cern-16256252021-04-21T21:41:46Zhttp://cds.cern.ch/record/1625625engMowbray, Thomas JCybersecurity: managing systems, conducting testing, and investigating intrusionsComputing and Computers A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a usefWileyoai:cds.cern.ch:16256252013 |
spellingShingle | Computing and Computers Mowbray, Thomas J Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title | Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title_full | Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title_fullStr | Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title_full_unstemmed | Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title_short | Cybersecurity: managing systems, conducting testing, and investigating intrusions |
title_sort | cybersecurity: managing systems, conducting testing, and investigating intrusions |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1625625 |
work_keys_str_mv | AT mowbraythomasj cybersecuritymanagingsystemsconductingtestingandinvestigatingintrusions |