Cyber crime, security and digital intelligence:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Farnham, Surrey
Gower Pub. Ltd.
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 FLA01 |
Beschreibung: | Includes bibliographical references and index Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security "Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book |
Beschreibung: | xlv, 252 pages : |
ISBN: | 9781409454502 1409454509 9781472403650 1472403657 9781409454496 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043787255 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781409454502 |9 978-1-4094-5450-2 | ||
020 | |a 1409454509 |9 1-4094-5450-9 | ||
020 | |a 9781472403650 |9 978-1-4724-0365-0 | ||
020 | |a 1472403657 |9 1-4724-0365-7 | ||
020 | |a 9781409454496 |9 978-1-4094-5449-6 | ||
035 | |a (ZDB-4-EBA)ocn854569624 | ||
035 | |a (OCoLC)854569624 | ||
035 | |a (DE-599)BVBBV043787255 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Johnson, Mark |d 1959- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber crime, security and digital intelligence |c Mark Johnson |
264 | 1 | |a Farnham, Surrey |b Gower Pub. Ltd. |c 2013 | |
300 | |a xlv, 252 pages : | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security | ||
500 | |a "Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book | ||
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029198314 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740 |l FLA01 |p ZDB-4-EBA |q FLA_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176623824535552 |
---|---|
any_adam_object | |
author | Johnson, Mark 1959- |
author_facet | Johnson, Mark 1959- |
author_role | aut |
author_sort | Johnson, Mark 1959- |
author_variant | m j mj |
building | Verbundindex |
bvnumber | BV043787255 |
collection | ZDB-4-EBA |
ctrlnum | (ZDB-4-EBA)ocn854569624 (OCoLC)854569624 (DE-599)BVBBV043787255 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04157nmm a2200565zc 4500</leader><controlfield tag="001">BV043787255</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409454502</subfield><subfield code="9">978-1-4094-5450-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409454509</subfield><subfield code="9">1-4094-5450-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781472403650</subfield><subfield code="9">978-1-4724-0365-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1472403657</subfield><subfield code="9">1-4724-0365-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409454496</subfield><subfield code="9">978-1-4094-5449-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn854569624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854569624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043787255</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnson, Mark</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber crime, security and digital intelligence</subfield><subfield code="c">Mark Johnson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Farnham, Surrey</subfield><subfield code="b">Gower Pub. Ltd.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xlv, 252 pages :</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029198314</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=559740</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FLA_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043787255 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:35:08Z |
institution | BVB |
isbn | 9781409454502 1409454509 9781472403650 1472403657 9781409454496 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029198314 |
oclc_num | 854569624 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | xlv, 252 pages : |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA ZDB-4-EBA FLA_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Gower Pub. Ltd. |
record_format | marc |
spelling | Johnson, Mark 1959- Verfasser aut Cyber crime, security and digital intelligence Mark Johnson Farnham, Surrey Gower Pub. Ltd. 2013 xlv, 252 pages : txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Threats to key sectors -- Cyber security fundamentals -- Cyber attack fundamentals -- Organised cyber attacks -- Cloud risks -- Web 2.0 risks -- Cyber security threat actors -- Common vulnerabilities -- Cyber security control frameworks -- Cyber security -- Digital intelligence -- The future of cyber security "Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without."--Unedited summary from book BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Cyberterrorism fast Wirtschaft Computer crimes Cyberterrorism Computer security Computer networks Security measures |
spellingShingle | Johnson, Mark 1959- Cyber crime, security and digital intelligence BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Cyberterrorism fast Wirtschaft Computer crimes Cyberterrorism Computer security Computer networks Security measures |
title | Cyber crime, security and digital intelligence |
title_auth | Cyber crime, security and digital intelligence |
title_exact_search | Cyber crime, security and digital intelligence |
title_full | Cyber crime, security and digital intelligence Mark Johnson |
title_fullStr | Cyber crime, security and digital intelligence Mark Johnson |
title_full_unstemmed | Cyber crime, security and digital intelligence Mark Johnson |
title_short | Cyber crime, security and digital intelligence |
title_sort | cyber crime security and digital intelligence |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Computer crimes fast Computer networks / Security measures fast Computer security fast Cyberterrorism fast Wirtschaft Computer crimes Cyberterrorism Computer security Computer networks Security measures |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Computer crimes Computer networks / Security measures Computer security Cyberterrorism Wirtschaft Computer networks Security measures |
work_keys_str_mv | AT johnsonmark cybercrimesecurityanddigitalintelligence |