| 000 | 04501nam a22009015i 4500 | ||
|---|---|---|---|
| 999 |
_c35238 _d35238 |
||
| 003 | CUTN | ||
| 005 | 20210806151011.0 | ||
| 008 | 191216s2020 nju 000 0 eng | ||
| 020 | _a9789811204456 | ||
| 020 | _z9789811204463 | ||
| 041 | _aEnglish | ||
| 042 | _apcc | ||
| 082 |
_a343.099 _bJAH |
||
| 100 | 1 | _aHessami, Ali G., | |
| 245 | 1 | 0 |
_aCyber security practitioner's guide _cAli G. Hessami, David A. E. Haddon, Thomas Welsh, George Copeland, Jon Cosson, Haider M. al-Khateeb, Stephen Sampana, Usman Javed Butt, Arvind Kumar, Stefan Kendzierskyj, Hamid Jahankhani, Jaime Ibarra Jimenez, Orret R. Grey, Raymond Brown, Reza Montasari, Richard Hill, Victoria Carpenter, Amin Hosseinian-Far, Ian Mitchell, Sukhvinder Hara, David Neilson, Firas Hazzaa, Sufian Yousef, John Goldie, Ojo Emmanuel Ademola, Nishan Chelvachandran, S�ergio Tenreiro de Magalh�aes, Hamid Jahankhani. |
| 300 | _apages cm | ||
| 505 | _tContents Chapter 1 Attack Vectors and the Challenge of Preventing Data Theft Chapter 2 Management of a Cyber Attack Chapter 3 Practical Cyber Security for Digital Trains Chapter 4 An Approach to Identify Risk-Based Human Behaviour Profiling Within an Office Environment Chapter 5 Ransomware Chapter 6 Protecting and Securing Data Through Blockchain Across Industries Chapter 7 Bring Your Own Device: GDPR Compliant or Headache? The Human Aspect in Security and Privacy Chapter 8 GDPR Compliance: Incident Response and Breach Notification Challenges Chapter 9 Evaluation of the Standardised Digital Forensic Investigation Process Model (SDFIPM) Chapter 10 Blockchain of Custody, BoC Chapter 11 New Issues in Cyber Security Forensics Chapter 12 Ethical Considerations and a Proposed Support Process When Employing People With Autistic Spectrum Disorder in Cyber Security Roles Chapter 13 An Ethical Approach to Understanding Cyber Security Chapter 14 An Analysis of Data Mining Metrics to Identify and Evaluate Potential Radicalisation Utilising Social Media Chapter 15 The European Union’s General Data Protection Regulation (GDPR) Index | ||
| 520 | _a"In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike. This book aims to provide a reference on current and emerging issues on systems security from the lens of autonomy, artificial intelligence and ethics as the race to fight and prevent cyber crime becomes increasingly pressing"-- | ||
| 700 | 1 | _aHaddon, David A. E., | |
| 700 | 1 | _aWelsh, Thomas, | |
| 700 | 1 | _aCopeland, George, | |
| 700 | 1 | _aCosson, Jon, | |
| 700 | 1 | _aal-Khateeb, Haider M., | |
| 700 | 1 | _aSampana, Stephen, | |
| 700 | 1 | _aButt, Usman Javed, | |
| 700 | 1 | _aKumar, Arvind, | |
| 700 | 1 | _aKendzierskyj, Stefan, | |
| 700 | 1 | _aJahankhani, Hamid, | |
| 700 | 1 | _aJimenez, Jaime Ibarra, | |
| 700 | 1 | _aGrey, Orret R., | |
| 700 | 1 | _aBrown, Raymond, | |
| 700 | 1 | _aMontasari, Reza, | |
| 700 | 1 | _aHill, Richard, | |
| 700 | 1 | _aCarpenter, Victoria, | |
| 700 | 1 | _aHosseinian-Far, Amin, | |
| 700 | 1 | _aMitchell, Ian, | |
| 700 | 1 | _aHara, Sukhvinder, | |
| 700 | 1 | _aNeilson, David, | |
| 700 | 1 | _aHazzaa, Firas, | |
| 700 | 1 | _aYousef, Sufian, | |
| 700 | 1 | _aGoldie, John, | |
| 700 | 1 | _aAdemola, Ojo Emmanuel, | |
| 700 | 1 | _aChelvachandran, Nishan, | |
| 700 | 1 | _ade Magalh�aes, S�ergio Tenreiro, | |
| 700 | 1 | _aJahankhani, Hamid, | |
| 942 |
_2ddc _cRB |
||
| 100 | 1 | _eauthor. | |
| 263 | _a2001 | ||
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eeditor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 700 | 1 | _eauthor. | |
| 906 |
_a0 _bibc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||