Cybersecurity Threats, Malware Trends, and Strategies: (Record no. 34413)
[ view plain ]
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
---|---|
ISBN | 978-1804613672 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Author Mark | RAI-C |
100 ## - MAIN ENTRY--AUTHOR | |
Author Name | Rains, Tim |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity Threats, Malware Trends, and Strategies: |
Sub-Title | Discover risk mitigation strategies for modern threats to your organization, |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd Ed; |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of Publication | Bermingham UK,. |
Name of publisher, distributor, etc. | Packt Publishing |
Date of publication, distribution, etc. | 2023 |
300 ## - PHYSICAL DESCRIPTION | |
Pages | 555p, |
500 ## - GENERAL NOTE | |
General note | Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.<br/><br/>Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.<br/><br/>By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Include index. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Not for loan | Collection code | Permanent Location | Current Location | Shelving Location | Date acquired | Source of acquisition | Price | Full Call Number | Accession No./Barcode | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Computer Science | Air University Kharian Campus Library | Air University Kharian Campus Library | Computer Science | 02/17/2025 | Ali Book Service | 3040.00 | 005.8 RAI-C | AUKHP0364 | 02/25/2025 | Book |