Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyberdangerunderstanding and guardin...
~
SpringerLink (Online service)
Cyberdangerunderstanding and guarding against cybercrime /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyberdangerby Eddy Willems.
Reminder of title:
understanding and guarding against cybercrime /
Author:
Willems, Eddy.
Published:
Cham :Springer International Publishing :2019.
Description:
xxii, 218 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
CyberterrorismPrevention.
Online resource:
https://doi.org/10.1007/978-3-030-04531-9
ISBN:
9783030045319$q(electronic bk.)
Cyberdangerunderstanding and guarding against cybercrime /
Willems, Eddy.
Cyberdanger
understanding and guarding against cybercrime /[electronic resource] :by Eddy Willems. - Cham :Springer International Publishing :2019. - xxii, 218 p. :ill., digital ;24 cm.
Thirty Years of Malware: A Short Outline -- Malware Author Profiles -- The Digital Underground Economy -- From Cyberwar to Hacktivism -- The Antivirus Companies -- Today's Threats -- Malware Myths -- Tips for Consumers: How to Travel Safely on the Information Superhighway -- Tips for Companies: Surviving on the Internet -- The Role of Government -- The Media -- The Digital Future -- Awakening: A Short Story.
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity.
ISBN: 9783030045319$q(electronic bk.)
Standard No.: 10.1007/978-3-030-04531-9doiSubjects--Topical Terms:
274740
Cyberterrorism
--Prevention.
LC Class. No.: HV6773.15.C97
Dewey Class. No.: 363.325
Cyberdangerunderstanding and guarding against cybercrime /
LDR
:02670nmm a2200349 a 4500
001
558705
003
DE-He213
005
20190528141047.0
006
m d
007
cr nn 008maaau
008
191219s2019 gw s 0 eng d
020
$a
9783030045319$q(electronic bk.)
020
$a
9783030045302$q(paper)
024
7
$a
10.1007/978-3-030-04531-9
$2
doi
035
$a
978-3-030-04531-9
040
$a
GP
$c
GP
041
1
$a
eng
$h
dut
050
4
$a
HV6773.15.C97
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
363.325
$2
23
090
$a
HV6773.15.C97
$b
W699 2019
100
1
$a
Willems, Eddy.
$3
841424
240
1 0
$a
Cybergevaar.
$l
English
245
1 0
$a
Cyberdanger
$h
[electronic resource] :
$b
understanding and guarding against cybercrime /
$c
by Eddy Willems.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xxii, 218 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Thirty Years of Malware: A Short Outline -- Malware Author Profiles -- The Digital Underground Economy -- From Cyberwar to Hacktivism -- The Antivirus Companies -- Today's Threats -- Malware Myths -- Tips for Consumers: How to Travel Safely on the Information Superhighway -- Tips for Companies: Surviving on the Internet -- The Role of Government -- The Media -- The Digital Future -- Awakening: A Short Story.
520
$a
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity.
650
0
$a
Cyberterrorism
$x
Prevention.
$3
274740
650
0
$a
Terrorism
$x
Prevention.
$3
266172
650
0
$a
Computer crimes.
$3
245152
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Crime Control and Security.
$3
790897
650
2 4
$a
Computer Crime.
$3
833604
650
2 4
$a
Security Science and Technology.
$3
510148
650
2 4
$a
Security Services.
$3
825729
650
2 4
$a
Mobile and Network Security.
$3
825732
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-04531-9
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000171095
電子館藏
1圖書
電子書
EB HV6773.15.C97 W699 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-04531-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login