Biblioteca UISEK

Catálogo en línea

Imagen de portada de Amazon
Imagen de Amazon.com

Solving cyber risk : protecting your company and society / Andrew Coburn, Eireann Leverett, Gordon Woo.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Wiley finance seriesEditor: Hoboken, New Jersey : Wiley, 2019Descripción: xii, 387 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • no mediado
Tipo de soporte:
  • volumen
ISBN:
  • 9781119490937 (hardcover)
Tema(s): Clasificación CDD:
  • 005.8  C658s 2019
Contenidos:
Counting the Costs of Cyber Attacks - Anatomy of a Data Exfiltration Attack - A Modern Scourge - Cyber Catastrophes - Preparing for Cyber Attacks - Cyber Loss Processes - Data Exfiltration - Contagious Malware Infection - Denial of Service Attacks - Cyber Enters the Physical World - A Brief History of Cyber-physical Interactions - Hacking Attacks on Cyber-physical Systems - Components of Cyber-physical Systems - How to Subvert Cyber-physical Systems - Ghosts in the Code - All Software Has Errors - Vulnerabilities, Exploits, and Zero Days - Counting Vulnerabilities - Know Your Enemy - Hackers - Taxonomy of Threat Actors - The Insider Threat - Threat Actors and Cyber Risk - Measuring the Cyber Threat - Measurement and Management - Cyber Threat Metrics - Rules, Regulations, and Law Enforcement - Cyber Laws - The Cyber-Resilient Organization - Changing Approaches to Risk Management - Cyber Insurance - Security Economics and Strategies - Ten Cyber Problems - Setting Problems - The Canal Safety Decision Problem - The Software Dependency Problem - Cyber Future - Cybergeddon - Cybertopia - Future Technology Trends - Getting the Cyber Risk Future We Want .
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Libro Miguel de Cervantes Sala general 005.8 C658s 2019 (Navegar estantería(Abre debajo)) Ej.1 Disponible 00015719

Incluye bibliografía y referencias

Counting the Costs of Cyber Attacks - Anatomy of a Data Exfiltration Attack - A Modern Scourge - Cyber Catastrophes - Preparing for Cyber Attacks - Cyber Loss Processes - Data Exfiltration - Contagious Malware Infection - Denial of Service Attacks - Cyber Enters the Physical World - A Brief History of Cyber-physical Interactions - Hacking Attacks on Cyber-physical Systems - Components of Cyber-physical Systems - How to Subvert Cyber-physical Systems - Ghosts in the Code - All Software Has Errors - Vulnerabilities, Exploits, and Zero Days - Counting Vulnerabilities - Know Your Enemy - Hackers - Taxonomy of Threat Actors -
The Insider Threat - Threat Actors and Cyber Risk - Measuring the Cyber Threat - Measurement and Management - Cyber Threat Metrics - Rules, Regulations, and Law Enforcement - Cyber Laws - The Cyber-Resilient Organization - Changing Approaches to Risk Management - Cyber Insurance - Security Economics and Strategies - Ten Cyber Problems - Setting Problems - The Canal Safety Decision Problem - The Software Dependency Problem - Cyber Future - Cybergeddon - Cybertopia - Future Technology Trends - Getting the Cyber Risk Future We Want .

M. de Ciberseguridad

No hay comentarios en este titulo.

para colocar un comentario.

Con tecnología Koha