Cyber security practitioner's guide / edited by Hamid Jahankhani.
Material type: TextPublisher: Singapore : World Scientific Publishing Co., 2020Description: xxxiv, 562 pages : illustrations (some color) ; 24 cmContent type:- text
- unmediated
- volume
- 9789811204456
- 005.8 C992
- QA76.9.A25
Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Main Library-Nabua | Circulation Section | CIR 005.8 C992 2020 (Browse shelf(Opens below)) | 1-2 | Available | 026241 | ||
Books | Main Library-Nabua | Circulation Section | CIR 005.8 C992 2020 (Browse shelf(Opens below)) | 2-2 | Available | 028125 |
Browsing Main Library-Nabua shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
CIR 005.8 C992 2018 3GE collection on law cybersecurity | CIR 005.8 C992 2018 Cyber security | CIR 005.8 C992 2018 Cyber security | CIR 005.8 C992 2020 Cyber security practitioner's guide / | CIR 005.8 C992 2020 Cyber security practitioner's guide / | CIR 005.8 D921m 2018 Mike Meyers' certification passport CompTIA security+ exam SYO-501/ | CIR 005.8 En321b 2011 The basics of hacking and penetration testing : ethical hacking and penetration testing made easy |
Includes bibliographical references and index.
Attack vectors and the challenge of preventing data theft -- Management of a cyber attack -- Practical cyber security for digital trains -- An approach to identify risk-based human behavior profiling within an office environment -- Ransomware -- protecting and securing data through blockchain across industries -- Bring your own device: GDPR compliant or headache? The human aspect in security and privacy -- GDPR compliance: incident response and breach notification challenges -- Evaluation of the standardised digital forensic investigation process model (SDFIPM) -- Blockchain of custody, BoC -- New issues in cyber security forensics -- Ethical considerations and a proposed support process when employing people with autistic spectrum disorder in cybersecurity roles -- An ethical approach to understanding cyber security -- An analysis of data mining metrics to identify and evaluate potential radicalisation utilising social media -- The European union's general data protection regulation (GDPR).
There are no comments on this title.