Cantitate/Preț
Produs

A History of Cyber Security Attacks: 1980 to Present

Autor Bruce Middleton
en Limba Engleză Paperback – 30 sep 2020
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 24600 lei  6-8 săpt.
  CRC Press – 30 sep 2020 24600 lei  6-8 săpt.
Hardback (1) 33570 lei  6-8 săpt.
  CRC Press – 14 iul 2017 33570 lei  6-8 săpt.

Preț: 24600 lei

Preț vechi: 35663 lei
-31% Nou

Puncte Express: 369

Preț estimativ în valută:
4708 4967$ 3924£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780367657857
ISBN-10: 0367657856
Pagini: 253
Dimensiuni: 156 x 234 x 19 mm
Greutate: 0.38 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications

Public țintă

General and Professional Practice & Development

Cuprins

Historical Overview of Cyber Security. Morris Worm. MafiaBoy. Google in China. Attack on NASA. Church of Scientology. Solar Sunrise. Melissa Virus. Internet Domain Name Root Server Attack. Target. The Original Logic Bomb. The Estonian Cyberwar. Epsilon. Moonlight Maze. Titan Rain. Sasser Worm.

Descriere

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to e