What every engineer should know about cyber security and digital forensics:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press
[2014]
|
Schriftenreihe: | What every engineer should know
v. 24 |
Schlagworte: | |
Beschreibung: | Includes bibliographical references "This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"-- |
Beschreibung: | 1 Online-Ressource (162 pages) |
ISBN: | 9781466564527 9781466564541 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV041633572 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140207s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781466564527 |c Print |9 978-1-4665-6452-7 | ||
020 | |a 9781466564541 |c Online |9 978-1-4665-6454-1 | ||
035 | |a (OCoLC)868551414 | ||
035 | |a (DE-599)BVBBV041633572 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a DeFranco, Joanna F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a What every engineer should know about cyber security and digital forensics |c Joanna F. DeFranco |
246 | 1 | 3 | |a Cyber security and digital forensics |
264 | 1 | |a Boca Raton |b CRC Press |c [2014] | |
300 | |a 1 Online-Ressource (162 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a What every engineer should know |v v. 24 | |
500 | |a Includes bibliographical references | ||
500 | |a "This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"-- | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes / Investigation | |
653 | |a Electronic books | ||
912 | |a ZDB-38-EBR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027074452 |
Datensatz im Suchindex
_version_ | 1804151852892160000 |
---|---|
any_adam_object | |
author | DeFranco, Joanna F. |
author_facet | DeFranco, Joanna F. |
author_role | aut |
author_sort | DeFranco, Joanna F. |
author_variant | j f d jf jfd |
building | Verbundindex |
bvnumber | BV041633572 |
collection | ZDB-38-EBR |
ctrlnum | (OCoLC)868551414 (DE-599)BVBBV041633572 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02541nmm a2200373zcb4500</leader><controlfield tag="001">BV041633572</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140207s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466564527</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-4665-6452-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466564541</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4665-6454-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)868551414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041633572</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">DeFranco, Joanna F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">What every engineer should know about cyber security and digital forensics</subfield><subfield code="c">Joanna F. DeFranco</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cyber security and digital forensics</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (162 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">What every engineer should know</subfield><subfield code="v">v. 24</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027074452</subfield></datafield></record></collection> |
id | DE-604.BV041633572 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:01:24Z |
institution | BVB |
isbn | 9781466564527 9781466564541 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027074452 |
oclc_num | 868551414 |
open_access_boolean | |
physical | 1 Online-Ressource (162 pages) |
psigel | ZDB-38-EBR |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press |
record_format | marc |
series2 | What every engineer should know |
spelling | DeFranco, Joanna F. Verfasser aut What every engineer should know about cyber security and digital forensics Joanna F. DeFranco Cyber security and digital forensics Boca Raton CRC Press [2014] 1 Online-Ressource (162 pages) txt rdacontent c rdamedia cr rdacarrier What every engineer should know v. 24 Includes bibliographical references "This book offers the non-security professional an introduction to the security risks involved when using technology and discusses how to mitigate the risk of security incidents. The book introduces the information security topics every engineer should understand if they use a computer or any mobile device that is connected to the Internet. Most engineers work at employers that want their data secure, but not every employer invests in training their engineers in understanding the risk. It is a well-known fact that the weakest link in any secure system is not the system--it is the user. Just ask any hacker. Topics include network security, personal data security, cloud computing, mobile computing, preparing for an incident, incident response, evidence handling, Internet usage, and security certifications. The book also discusses cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing to demonstrate the impact of security on different engineering disciplines. In addition, the book covers the application of the concepts, presented via short case studies of real-world incidents throughout, chronologically delineating related events. It also provides information on certifications and reference manuals in the area of information security and digital forensics"-- Computer networks / Security measures Computer security Computer crimes / Investigation Electronic books |
spellingShingle | DeFranco, Joanna F. What every engineer should know about cyber security and digital forensics Computer networks / Security measures Computer security Computer crimes / Investigation |
title | What every engineer should know about cyber security and digital forensics |
title_alt | Cyber security and digital forensics |
title_auth | What every engineer should know about cyber security and digital forensics |
title_exact_search | What every engineer should know about cyber security and digital forensics |
title_full | What every engineer should know about cyber security and digital forensics Joanna F. DeFranco |
title_fullStr | What every engineer should know about cyber security and digital forensics Joanna F. DeFranco |
title_full_unstemmed | What every engineer should know about cyber security and digital forensics Joanna F. DeFranco |
title_short | What every engineer should know about cyber security and digital forensics |
title_sort | what every engineer should know about cyber security and digital forensics |
topic | Computer networks / Security measures Computer security Computer crimes / Investigation |
topic_facet | Computer networks / Security measures Computer security Computer crimes / Investigation |
work_keys_str_mv | AT defrancojoannaf whateveryengineershouldknowaboutcybersecurityanddigitalforensics AT defrancojoannaf cybersecurityanddigitalforensics |