Security 2020: reduce security risks this decade
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley Pub.
© 2011
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 UBY01 Volltext |
Beschreibung: | Includes index Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvi, 305 pages) |
ISBN: | 9781118008317 1118008316 9781118008324 1118008324 9781118008331 1118008332 9781118255803 1118255801 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043393258 | ||
003 | DE-604 | ||
005 | 20210310 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781118008317 |c ebook |9 978-1-118-00831-7 | ||
020 | |a 1118008316 |c ebook |9 1-118-00831-6 | ||
020 | |a 9781118008324 |c ebook |9 978-1-118-00832-4 | ||
020 | |a 1118008324 |c ebook |9 1-118-00832-4 | ||
020 | |a 9781118008331 |c ebook |9 978-1-118-00833-1 | ||
020 | |a 1118008332 |c ebook |9 1-118-00833-2 | ||
020 | |a 9781118255803 |c electronic bk. |9 978-1-118-25580-3 | ||
020 | |a 1118255801 |c electronic bk. |9 1-118-25580-1 | ||
024 | 7 | |a 10.1002/9781118255803 |2 doi | |
035 | |a (ZDB-35-WIC)ocn732958481 | ||
035 | |a (OCoLC)732958481 | ||
035 | |a (DE-599)BVBBV043393258 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Howard, Doug |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security 2020 |b reduce security risks this decade |c Doug Howard and Kevin Prince |
250 | |a 1st ed | ||
264 | 1 | |a Indianapolis, Ind. |b Wiley Pub. |c © 2011 | |
300 | |a 1 Online-Ressource (xxvi, 305 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer security / Forecasting | |
653 | |a Electronic books | ||
700 | 1 | |a Prince, Kevin |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-470-63955-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-470-63955-5 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028811842 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175970585804800 |
---|---|
any_adam_object | |
author | Howard, Doug |
author_facet | Howard, Doug |
author_role | aut |
author_sort | Howard, Doug |
author_variant | d h dh |
building | Verbundindex |
bvnumber | BV043393258 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn732958481 (OCoLC)732958481 (DE-599)BVBBV043393258 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03174nmm a2200625zc 4500</leader><controlfield tag="001">BV043393258</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210310 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118008317</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-118-00831-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118008316</subfield><subfield code="c">ebook</subfield><subfield code="9">1-118-00831-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118008324</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-118-00832-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118008324</subfield><subfield code="c">ebook</subfield><subfield code="9">1-118-00832-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118008331</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-118-00833-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118008332</subfield><subfield code="c">ebook</subfield><subfield code="9">1-118-00833-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118255803</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-25580-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118255801</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-25580-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118255803</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn732958481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)732958481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043393258</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Howard, Doug</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security 2020</subfield><subfield code="b">reduce security risks this decade</subfield><subfield code="c">Doug Howard and Kevin Prince</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 305 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Forecasting</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prince, Kevin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-470-63955-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-470-63955-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028811842</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043393258 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:45Z |
institution | BVB |
isbn | 9781118008317 1118008316 9781118008324 1118008324 9781118008331 1118008332 9781118255803 1118255801 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028811842 |
oclc_num | 732958481 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 Online-Ressource (xxvi, 305 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley Pub. |
record_format | marc |
spelling | Howard, Doug Verfasser aut Security 2020 reduce security risks this decade Doug Howard and Kevin Prince 1st ed Indianapolis, Ind. Wiley Pub. © 2011 1 Online-Ressource (xxvi, 305 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond. IT security needs are constantly evolving; this guide examine Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer security / Forecasting Electronic books Prince, Kevin Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 978-0-470-63955-9 Erscheint auch als Druck-Ausgabe, Paperback 0-470-63955-5 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Howard, Doug Security 2020 reduce security risks this decade COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer security / Forecasting |
title | Security 2020 reduce security risks this decade |
title_auth | Security 2020 reduce security risks this decade |
title_exact_search | Security 2020 reduce security risks this decade |
title_full | Security 2020 reduce security risks this decade Doug Howard and Kevin Prince |
title_fullStr | Security 2020 reduce security risks this decade Doug Howard and Kevin Prince |
title_full_unstemmed | Security 2020 reduce security risks this decade Doug Howard and Kevin Prince |
title_short | Security 2020 |
title_sort | security 2020 reduce security risks this decade |
title_sub | reduce security risks this decade |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer security / Forecasting |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer security / Forecasting |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118255803 |
work_keys_str_mv | AT howarddoug security2020reducesecurityrisksthisdecade AT princekevin security2020reducesecurityrisksthisdecade |