Big Breaches: Cybersecurity Lessons for Everyone
(eBook)

Book Cover
Published:
Berkeley, CA : Apress :, 2021.
Format:
eBook
Edition:
1st ed. 2021.
ISBN:
9781484266557, 1484266552
Content Description:
1 online resource (XLVII, 427 pages 41 illustrations :) : online resource
Status:
Available Online

Description

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book's expert insights and be prepared for the future of cybersecurity.

Copies

CCU Electronic Resources

More Like This

Citations

APA Citation (style guide)

Daswani, N., & Elbayadi, M. (2021). Big Breaches: Cybersecurity Lessons for Everyone. 1st ed. 2021. Berkeley, CA, Apress.

Chicago / Turabian - Author Date Citation (style guide)

Daswani, Neil and Moudy, Elbayadi. 2021. Big Breaches: Cybersecurity Lessons for Everyone. Berkeley, CA, Apress.

Chicago / Turabian - Humanities Citation (style guide)

Daswani, Neil and Moudy, Elbayadi, Big Breaches: Cybersecurity Lessons for Everyone. Berkeley, CA, Apress, 2021.

MLA Citation (style guide)

Daswani, Neil, and Moudy Elbayadi. Big Breaches: Cybersecurity Lessons for Everyone. 1st ed. 2021. Berkeley, CA, Apress, 2021.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.

More Copies In Prospector

Loading Prospector Copies...

More Details

Language:
English
UPC:
10.1007/978-1-4842-6655-7.

Notes

Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book's expert insights and be prepared for the future of cybersecurity.

Staff View

Grouped Work ID:
92064b8a-d07f-1044-6048-26b4e01425c3
Go To Grouped Work

Record Information

Last Sierra Extract TimeDec 14, 2024 08:38:39 PM
Last File Modification TimeDec 14, 2024 08:39:02 PM
Last Grouped Work Modification TimeDec 14, 2024 08:38:45 PM

MARC Record

LEADER04833cam a2200613Mi 4500
0011253565567
003OCoLC
00520211005031419.0
006m        d        
007cr nn||||mamaa
008210224s2021    cau     o     ||| 0 eng d
020 |a 9781484266557
020 |a 1484266552
020 |z 9781484266557
0247 |a 10.1007/978-1-4842-6655-7. |2 doi
035 |a (OCoLC)1253565567
040 |a LIP |b eng |c LIP |d OCLCO |d OCLCF
049 |a FCXA
0504 |a QA76.9.A25
0727 |a UR. |2 bicssc
0727 |a COM053000. |2 bisacsh
0727 |a UR. |2 thema
08204 |a 005.8 |2 23
1001 |a Daswani, Neil, |0 https://id.loc.gov/authorities/names/no2007064328 |e author.
24510 |a Big Breaches |h [electronic resource] : |b Cybersecurity Lessons for Everyone / |c by Neil Daswani, Moudy Elbayadi.
250 |a 1st ed. 2021.
2641 |a Berkeley, CA : |b Apress : |b Imprint: Apress, |c 2021.
300 |a 1 online resource (XLVII, 427 pages 41 illustrations :) : |b online resource
336 |a text |b txt |2 rdacontent
337 |a computer |b c |2 rdamedia
338 |a online resource |b cr |2 rdacarrier
347 |a text file |b PDF |2 rda
5050 |a Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.-.
520 |a The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book's expert insights and be prepared for the future of cybersecurity.
6500 |a Data protection. |0 https://id.loc.gov/authorities/subjects/sh85035859
6500 |a Computer security |0 https://id.loc.gov/authorities/subjects/sh90001862 |v Case studies. |0 https://id.loc.gov/authorities/subjects/sh99001484
65010 |a Securities. |0 https://id.loc.gov/authorities/subjects/sh85119463
6507 |a Data protection. |2 fast |0 (OCoLC)fst00887958
6557 |a Case studies. |2 lcgft |0 https://id.loc.gov/authorities/genreForms/gf2017026140
7001 |a Elbayadi, Moudy, |0 https://id.loc.gov/authorities/names/no2021150635 |e author.
77608 |i Printed edition: |z 9781484266540
77608 |i Printed edition: |z 9781484266564
907 |a .b6472461x
948 |a MARCIVE Comprehensive, in 2023.02
948 |a MARCIVE Comp, 03/2022
948 |a MARCIVE Over, 11/2021
989 |1 .i14024671x |d cceb |g j |m  |h 0 |x 0 |t 0 |i 0 |j 188 |k 211005 |o - |w CCU Owned |u https://ebookcentral.proquest.com/lib/cochristuniv-ebooks/detail.action?docID=6508443
994 |a C0 |b FCX
995 |a Loaded with m2btab.ltiac in 2023.02
995 |a Loaded with m2btab.ltiac in 2022.03
995 |a Loaded with m2btab.ltiac in 2021.11
995 |a Loaded with m2btab.elec in 2021.10
995 |a Loaded with m2btab.auth in 2021.11
998 |e - |f eng |a cc