Cyberspace and cybersecurity
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Updates include top...
Saved in:
| Main Author: | Kostopoulos, George K. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
CRC Press, Taylor & Francis Group
2018
|
| Edition: | Second edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan
by: Chan, Yongxue Duncan
US national cybersecurity international politics, concepts and organization
Published: (2017)
Published: (2017)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Securing the GCC in cyberspace
by: Clarke, Richard A., et al.
Published: (2010)
by: Clarke, Richard A., et al.
Published: (2010)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Cybersecurity Ops with bash attack, defend, and analyze from the command line
by: Troncone, Paul, et al.
Published: (2019)
by: Troncone, Paul, et al.
Published: (2019)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Industrial cybersecurity efficiently secure critical infrastructure systems
by: Ackerman, Pascal
Published: (2017)
by: Ackerman, Pascal
Published: (2017)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Similar Items
-
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014) -
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan -
US national cybersecurity international politics, concepts and organization
Published: (2017) -
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019) -
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran


