Cyber Crisis:
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on ou...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
[Erscheinungsort nicht ermittelbar]
Tantor Media, Inc.
2021
|
Edition: | 1st edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781666125313/?ar |
Summary: | Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on thirty years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target. |
Item Description: | Online resource; Title from title page (viewed June 1, 2021) |
Physical Description: | 1 Online-Ressource (1 sound file) |
ISBN: | 9781666125313 1666125318 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-071016295 | ||
003 | DE-627-1 | ||
005 | 20240228121535.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211206s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781666125313 |9 978-1-6661-2531-3 | ||
020 | |a 1666125318 |9 1-6661-2531-8 | ||
035 | |a (DE-627-1)071016295 | ||
035 | |a (DE-599)KEP071016295 | ||
035 | |a (ORHE)9781666125313 | ||
035 | |a (DE-627-1)071016295 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Cole, Eric |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber Crisis |c Cole, Eric |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b Tantor Media, Inc. |c 2021 | |
300 | |a 1 Online-Ressource (1 sound file) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed June 1, 2021) | ||
520 | |a Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on thirty years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target. | ||
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer crimes |0 (OCoLC)fst00872063 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Cyberterrorism |0 (OCoLC)fst00885802 | |
650 | 4 | |a Downloadable audio books | |
650 | 4 | |a Audiobooks |0 (OCoLC)fst01726208 | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Murray, Michael |e ErzählerIn |4 nrt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781666125313/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-071016295 |
---|---|
_version_ | 1829007740921446401 |
adam_text | |
any_adam_object | |
author | Cole, Eric |
author2 | Murray, Michael |
author2_role | nrt |
author2_variant | m m mm |
author_facet | Cole, Eric Murray, Michael |
author_role | aut |
author_sort | Cole, Eric |
author_variant | e c ec |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)071016295 (DE-599)KEP071016295 (ORHE)9781666125313 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02940cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-071016295</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121535.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211206s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781666125313</subfield><subfield code="9">978-1-6661-2531-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1666125318</subfield><subfield code="9">1-6661-2531-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)071016295</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP071016295</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781666125313</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)071016295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Crisis</subfield><subfield code="c">Cole, Eric</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Tantor Media, Inc.</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 sound file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed June 1, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on thirty years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="0">(OCoLC)fst00872063</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="0">(OCoLC)fst00885802</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Downloadable audio books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield><subfield code="0">(OCoLC)fst01726208</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Murray, Michael</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781666125313/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-071016295 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:06Z |
institution | BVB |
isbn | 9781666125313 1666125318 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 sound file) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Tantor Media, Inc. |
record_format | marc |
spelling | Cole, Eric VerfasserIn aut Cyber Crisis Cole, Eric 1st edition. [Erscheinungsort nicht ermittelbar] Tantor Media, Inc. 2021 1 Online-Ressource (1 sound file) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed June 1, 2021) Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on thirty years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target. Cyberterrorism Computer crimes Computer security Computer Security Cyberterrorisme Criminalité informatique Sécurité informatique Computer crimes (OCoLC)fst00872063 Computer security (OCoLC)fst00872484 Cyberterrorism (OCoLC)fst00885802 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio Murray, Michael ErzählerIn nrt |
spellingShingle | Cole, Eric Cyber Crisis Cyberterrorism Computer crimes Computer security Computer Security Cyberterrorisme Criminalité informatique Sécurité informatique Computer crimes (OCoLC)fst00872063 Computer security (OCoLC)fst00872484 Cyberterrorism (OCoLC)fst00885802 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio |
subject_GND | (OCoLC)fst00872063 (OCoLC)fst00872484 (OCoLC)fst00885802 (OCoLC)fst01726208 |
title | Cyber Crisis |
title_auth | Cyber Crisis |
title_exact_search | Cyber Crisis |
title_full | Cyber Crisis Cole, Eric |
title_fullStr | Cyber Crisis Cole, Eric |
title_full_unstemmed | Cyber Crisis Cole, Eric |
title_short | Cyber Crisis |
title_sort | cyber crisis |
topic | Cyberterrorism Computer crimes Computer security Computer Security Cyberterrorisme Criminalité informatique Sécurité informatique Computer crimes (OCoLC)fst00872063 Computer security (OCoLC)fst00872484 Cyberterrorism (OCoLC)fst00885802 Downloadable audio books Audiobooks (OCoLC)fst01726208 Audiobooks Livres audio |
topic_facet | Cyberterrorism Computer crimes Computer security Computer Security Cyberterrorisme Criminalité informatique Sécurité informatique Downloadable audio books Audiobooks Livres audio |
work_keys_str_mv | AT coleeric cybercrisis AT murraymichael cybercrisis |