Cybersecurityby Melissa Higgins and Michael Regan.
Material type: TextSeries: Publication details: Minneapolis, Minnesota : Essential Library, an imprint of Abdo Publishing, (c)2016.Description: 1 online resource : color illustrationsContent type:- text
- computer
- online resource
- 9781680770278
- QA76 .C934 2016
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Non-fiction | QA76.9.25 (Browse shelf(Opens below)) | Link to resource | Available | ocn927402885 |
Browsing G. Allen Fleece Library shelves, Shelving location: ONLINE, Collection: Non-fiction Close shelf browser (Hides shelf browser)
E901.1.37 Kamala Harris /Kelsey Jopp. | E901.1.43 Ilhan Omar /by Jeanne Marie Ford. | LB1047.3.63 2015 Analyze and define the assignment /Valerie Bodden. | QA76.9.25 Cybersecurityby Melissa Higgins and Michael Regan. | P301.5.47 Writing powerful persuasive pieces /Nancy Loewen. | QA76.76.65 STEAM guides in app development /Ruth M. Kirk ; edited by Keli Sipperley. | HD6061.2.6 The Gender Wage Gap. |
Includes bibliographies and index.
The worm that changed the cyber world -- Internet history -- How it all works -- Hackers and hacktivists -- Threats to companies -- Threats to personal computers -- Electronic warfare and terror -- Defense and offense -- Future cyberthreats and future solutions.
Cybersecurity discusses the evolving nature of Internet-based attacks, the vulnerabilities of individuals and corporations to these threats, and the hackers who carry out or defend against cyberattacks.
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.