Cargando…
Cybersecurity incident response: how to contain, eradicate, and recover from incidents
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Apress
2018
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2647612 |
_version_ | 1780960615818330112 |
---|---|
author | Thompson, Eric C |
author_facet | Thompson, Eric C |
author_sort | Thompson, Eric C |
collection | CERN |
id | cern-2647612 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2018 |
publisher | Apress |
record_format | invenio |
spelling | cern-26476122021-04-21T18:40:01Zhttp://cds.cern.ch/record/2647612engThompson, Eric CCybersecurity incident response: how to contain, eradicate, and recover from incidentsComputing and ComputersApressoai:cds.cern.ch:26476122018 |
spellingShingle | Computing and Computers Thompson, Eric C Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title | Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title_full | Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title_fullStr | Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title_full_unstemmed | Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title_short | Cybersecurity incident response: how to contain, eradicate, and recover from incidents |
title_sort | cybersecurity incident response: how to contain, eradicate, and recover from incidents |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2647612 |
work_keys_str_mv | AT thompsonericc cybersecurityincidentresponsehowtocontaineradicateandrecoverfromincidents |