Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Big Breaches = Cybersecurity Lessons...
~
SpringerLink (Online service)
Big Breaches = Cybersecurity Lessons for Everyone /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Big Breaches/ by Neil Daswani, Moudy Elbayadi.
Reminder of title:
Cybersecurity Lessons for Everyone /
Author:
Daswani, Neil.
other author:
Elbayadi, Moudy.
Description:
XLVII, 427 p. 41 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-6655-7
ISBN:
9781484266557
Big Breaches = Cybersecurity Lessons for Everyone /
Daswani, Neil.
Big Breaches
Cybersecurity Lessons for Everyone /[electronic resource] :by Neil Daswani, Moudy Elbayadi. - 1st ed. 2021. - XLVII, 427 p. 41 illus.online resource.
Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.-.
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity. .
ISBN: 9781484266557
Standard No.: 10.1007/978-1-4842-6655-7doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Big Breaches = Cybersecurity Lessons for Everyone /
LDR
:03714nam a22003975i 4500
001
1045868
003
DE-He213
005
20210929191617.0
007
cr nn 008mamaa
008
220103s2021 xxu| s |||| 0|eng d
020
$a
9781484266557
$9
978-1-4842-6655-7
024
7
$a
10.1007/978-1-4842-6655-7
$2
doi
035
$a
978-1-4842-6655-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Daswani, Neil.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1349323
245
1 0
$a
Big Breaches
$h
[electronic resource] :
$b
Cybersecurity Lessons for Everyone /
$c
by Neil Daswani, Moudy Elbayadi.
250
$a
1st ed. 2021.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
XLVII, 427 p. 41 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.-.
520
$a
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity. .
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Security.
$3
1114130
700
1
$a
Elbayadi, Moudy.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1349324
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484266540
776
0 8
$i
Printed edition:
$z
9781484266564
776
0 8
$i
Printed edition:
$z
9781484278710
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6655-7
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login