Digital Defense (Record no. 53465)

000 -LEADER
fixed length control field 03075nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-319-19953-5
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111155.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151016s2015 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319199535
-- 978-3-319-19953-5
082 04 - CLASSIFICATION NUMBER
Call Number 600
100 1# - AUTHOR NAME
Author Pelton, Joseph.
245 10 - TITLE STATEMENT
Title Digital Defense
Sub Title A Cybersecurity Primer /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2015.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XX, 209 p. 42 illus., 36 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Do You Know Your Cyber Space? -- What Is at Stake -- Is Anyone Looking Out for You -- Ten Key Things to Protect -- Where to Go for Assistance -- Who Will Control the Future -- Ten Commandments for Your Cyber Defense -- Glossary.
520 ## - SUMMARY, ETC.
Summary, etc Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, phishing, malware, and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. As more and more of life's transactions take place online, the average computer user and society at large have a lot to lose. All users can take steps to secure their information. Cybercrime is so subtle and hidden, people can ignore the threat until it is too late. Yet today about every three seconds a person is hit by some form of cyberattack out of the blue. Locking the "cyber-barn door" after a hacker has struck is way too late. Cybersecurity, cybercrime, and cyberterrorism may seem to be intellectual crimes that don't really touch the average person, but the threat is real. Demystifying them is the most important step, and this accessible explanation covers all the bases.
700 1# - AUTHOR 2
Author 2 Singh, Indu B.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-19953-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Popular works.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Technology.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electrical engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Popular Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Popular Science in Technology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
912 ## -
-- ZDB-2-ENG

No items available.