Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Informasi Dasar

20.21.1210
005.8
Buku - Elektronik (E-Book)
4

Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.

The book provides an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.

The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.

By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.

Subjek

DATA SECURITY
 

Katalog

Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks
978-1800206014
429p.: pdf file.; 4 MB
English

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

Tim Rains
Perorangan
 
 

Penerbit

Packt Publishing
New York
2020

Koleksi

Kompetensi

  • CIG4L3 - KRIPTOGRAFI
  • TTI6T3 - KEAMANAN INFORMASI
  • VTI3D3 - KEAMANAN JARINGAN
  • VKI2H3 - KEAMANAN JARINGAN
  • CII6K3 - KEAMANAN JARINGAN LANJUT
  • CII3E3 - KEAMANAN SIBER
  • TTI6H3 - KEAMANAN SIBER LANJUT
  • CTI3E3 - KEAMANAN SISTEM
  • ISI3G4 - KEAMANAN SISTEM INFORMASI
  • TKI3D3 - KEAMANAN SISTEM KOMPUTER
  • CTI4P3 - KEAMANAN WEB
  • CII6D3 - PENGANTAR KEAMANAN SIBER & FORENSIK
  • TKI4Q3 - SISTEM MANAJEMEN KEAMANAN INFORMASI
  • CII7U3 - TOPIK KHUSUS DALAM KEAMANAN IOT
  • TTI6S3 - TOPIK PILIHAN DALAM REKAYASA JARINGAN DAN KEAMANAN SIBER
  • CSH5B3 - JARINGAN LANJUT
  • CII6D3 - PENGANTAR KEAMANAN SIBER & FORENSIK
  • CII6K3 - KEAMANAN JARINGAN LANJUT
  • CII7U3 - TOPIK KHUSUS DALAM KEAMANAN IOT
  • CII4R3 - FORENSIK DIGITAL
  • CPI3E3 - KEAMANAN SIBER
  • UWI1B2 - LITERASI DATA
  • CMI6G3 - FORENSIK DIGITAL LANJUT
  • ISI6B3 - JAMINAN INFORMASI DAN KEAMANAN

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini