Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Cybersecurity Threats, Malware Trends, and Strategies: (Record no. 34413)

MARC details
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 978-1804613672
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Author Mark RAI-C
100 ## - MAIN ENTRY--AUTHOR
Author Name Rains, Tim
245 ## - TITLE STATEMENT
Title Cybersecurity Threats, Malware Trends, and Strategies:
Sub-Title Discover risk mitigation strategies for modern threats to your organization,
250 ## - EDITION STATEMENT
Edition statement 2nd Ed;
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of Publication Bermingham UK,.
Name of publisher, distributor, etc. Packt Publishing
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Pages 555p,
500 ## - GENERAL NOTE
General note Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.<br/><br/>Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.<br/><br/>By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Include index.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Holdings
Withdrawn status Not for loan Collection code Permanent Location Current Location Shelving Location Date acquired Source of acquisition Price Full Call Number Accession No./Barcode Date last seen Koha item type
    Computer Science Air University Kharian Campus Library Air University Kharian Campus Library Computer Science 02/17/2025 Ali Book Service 3040.00 005.8 RAI-C AUKHP0364 02/25/2025 Book
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631