Digital defense: a cybersecurity primer
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2015
|
Schlagworte: | |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9783319199535 |
DOI: | 10.1007/978-3-319-19953-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043208913 | ||
003 | DE-604 | ||
005 | 20160106 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319199535 |c Online |9 978-3-319-19953-5 | ||
024 | 7 | |a 10.1007/978-3-319-19953-5 |2 doi | |
035 | |a (OCoLC)930006322 | ||
035 | |a (DE-599)BVBBV043208913 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1043 |a DE-B768 |a DE-Aug4 |a DE-898 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-92 |a DE-862 |a DE-861 |a DE-706 | ||
082 | 0 | |a 600 |2 23 | |
100 | 1 | |a Pelton, Joseph N. |d 1943- |e Verfasser |0 (DE-588)170744647 |4 aut | |
245 | 1 | 0 | |a Digital defense |b a cybersecurity primer |c Joseph Pelton ; Indu B. Singh |
264 | 1 | |a Cham [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Popular works | |
650 | 4 | |a Computer security | |
650 | 4 | |a Technology | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Popular Science | |
650 | 4 | |a Popular Science in Technology | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Singh, Indu B. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-19952-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-19953-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632074 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-19953-5 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 589615 |
---|---|
_version_ | 1824554483720388608 |
adam_text | DIGITAL DEFENSE
/ PELTON, JOSEPH
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DO YOU KNOW YOUR CYBER SPACE?
WHAT IS AT STAKE
IS ANYONE LOOKING OUT FOR YOU
TEN KEY THINGS TO PROTECT
WHERE TO GO FOR ASSISTANCE
WHO WILL CONTROL THE FUTURE
TEN COMMANDMENTS FOR YOUR CYBER DEFENSE
GLOSSARY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DIGITAL DEFENSE
/ PELTON, JOSEPH
: 2015
ABSTRACT / INHALTSTEXT
DRS. PELTON AND SINGH WARN OF THE INCREASING RISKS OF CYBERCRIME AND LAY
OUT A SERIES OF COMMONSENSE PRECAUTIONS TO GUARD AGAINST INDIVIDUAL
SECURITY BREACHES. THIS GUIDE CLEARLY EXPLAINS THE TECHNOLOGY AT ISSUE,
THE POINTS OF WEAKNESS, AND THE BEST WAYS TO PROACTIVELY MONITOR AND
MAINTAIN THE INTEGRITY OF INDIVIDUAL NETWORKS. COVERING BOTH THE MOST
COMMON PERSONAL ATTACKS OF IDENTITY FRAUD, PHISHING, MALWARE, AND BREACH
OF ACCESS AS WELL AS THE LARGER THREATS AGAINST COMPANIES AND
GOVERNMENTAL SYSTEMS, THE AUTHORS EXPLAIN THE VULNERABILITIES OF THE
INTERNET AGE. AS MORE AND MORE OF LIFE S TRANSACTIONS TAKE PLACE ONLINE,
THE AVERAGE COMPUTER USER AND SOCIETY AT LARGE HAVE A LOT TO LOSE. ALL
USERS CAN TAKE STEPS TO SECURE THEIR INFORMATION. CYBERCRIME IS SO
SUBTLE AND HIDDEN, PEOPLE CAN IGNORE THE THREAT UNTIL IT IS TOO LATE.
YET TODAY ABOUT EVERY THREE SECONDS A PERSON IS HIT BY SOME FORM OF
CYBERATTACK OUT OF THE BLUE. LOCKING THE “CYBER-BARN DOOR” AFTER A
HACKER HAS STRUCK IS WAY TOO LATE. CYBERSECURITY, CYBERCRIME, AND
CYBERTERRORISM MAY SEEM TO BE INTELLECTUAL CRIMES THAT DON T REALLY
TOUCH THE AVERAGE PERSON, BUT THE THREAT IS REAL. DEMYSTIFYING THEM IS
THE MOST IMPORTANT STEP, AND THIS ACCESSIBLE EXPLANATION COVERS ALL THE
BASES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Pelton, Joseph N. 1943- |
author_GND | (DE-588)170744647 |
author_facet | Pelton, Joseph N. 1943- |
author_role | aut |
author_sort | Pelton, Joseph N. 1943- |
author_variant | j n p jn jnp |
building | Verbundindex |
bvnumber | BV043208913 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)930006322 (DE-599)BVBBV043208913 |
dewey-full | 600 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 600 - Technology (Applied sciences) |
dewey-raw | 600 |
dewey-search | 600 |
dewey-sort | 3600 |
dewey-tens | 600 - Technology (Applied sciences) |
discipline | Technik allgemein |
doi_str_mv | 10.1007/978-3-319-19953-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03570nmm a2200685zc 4500</leader><controlfield tag="001">BV043208913</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160106 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319199535</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-19953-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-19953-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930006322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043208913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">600</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pelton, Joseph N.</subfield><subfield code="d">1943-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)170744647</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital defense</subfield><subfield code="b">a cybersecurity primer</subfield><subfield code="c">Joseph Pelton ; Indu B. Singh</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Popular works</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Popular Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Popular Science in Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Indu B.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-19952-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632074</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-19953-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043208913 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:52:29Z |
institution | BVB |
isbn | 9783319199535 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632074 |
oclc_num | 930006322 |
open_access_boolean | |
owner | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
owner_facet | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG ZDB-2-ENG_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
spellingShingle | Pelton, Joseph N. 1943- Digital defense a cybersecurity primer Popular works Computer security Technology Electrical engineering Popular Science Popular Science in Technology Systems and Data Security Communications Engineering, Networks Computersicherheit (DE-588)4274324-2 gnd Cyberattacke (DE-588)1075612675 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)1075612675 |
title | Digital defense a cybersecurity primer |
title_auth | Digital defense a cybersecurity primer |
title_exact_search | Digital defense a cybersecurity primer |
title_full | Digital defense a cybersecurity primer Joseph Pelton ; Indu B. Singh |
title_fullStr | Digital defense a cybersecurity primer Joseph Pelton ; Indu B. Singh |
title_full_unstemmed | Digital defense a cybersecurity primer Joseph Pelton ; Indu B. Singh |
title_short | Digital defense |
title_sort | digital defense a cybersecurity primer |
title_sub | a cybersecurity primer |
topic | Popular works Computer security Technology Electrical engineering Popular Science Popular Science in Technology Systems and Data Security Communications Engineering, Networks Computersicherheit (DE-588)4274324-2 gnd Cyberattacke (DE-588)1075612675 gnd |
topic_facet | Popular works Computer security Technology Electrical engineering Popular Science Popular Science in Technology Systems and Data Security Communications Engineering, Networks Computersicherheit Cyberattacke |
url | https://doi.org/10.1007/978-3-319-19953-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632074&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT peltonjosephn digitaldefenseacybersecurityprimer AT singhindub digitaldefenseacybersecurityprimer |