The Language of Cybersecurity
Free Shipping Included! The Language of Cybersecurity by XML Press at Translate This Website. Hurry! Limited time offer. Offer valid only while supplies last. The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not
The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecurity, and every business professional also needs to be able to speak intelligently with cybersecurity professionals.
The Language of Cybersecurity introduces the world of cybersecurity through the terminology that defines the field. Each of the 52 main terms contains a definition, a statement of why the term is important, and an essay that explains why a business professional should know about the term.
Each term was authored by an expert practitioner in that area.
The Language of Cybersecurity looks at vulnerabilities, exploits, defenses, planning, and compliance. In addition there is a glossary that defines more than 80 additional. For those who want to dig deeper, there are more than 150 references for further exploration.
Expertly compiled and edited by Tonie Flores, this book is a useful reference for cybersecurity experts, managers, students, and anyone who uses a computer, tablet, smart phone, or other computing device.
|Item Size:||0.4 x 8.5 x 8.5 inches|
|Package Weight:||0.5 pounds|
|Package Size:||5.51 x 0.43 x 0.43 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by XML Press, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
By Hosmer Chet
ean: 9780124186767, isbn: 0124186769,
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice P...
By Morgan Kaufmann
ean: 9780123943972, isbn: 0123943973,
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they rel...
mpn: illustrations, ean: 9780735617223, isbn: 0735617228,
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robus...
By Siriwardena Prabath
ean: 9781430268185, isbn: 1430268182,
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of e...
mpn: Illustrated, ean: 9781597499637, isbn: 1597499633,
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Secur...
By Addison-Wesley Professional
mpn: 36080949, ean: 9780321822130, isbn: 9780321822130,
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has d...