Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham, UK
Packt Publishing Ltd.
2023
|
Edition: | Second edition. |
Series: | Expert insight
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781804613672/?ar |
Summary: | Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. |
Item Description: | Includes bibliographical references and index |
Physical Description: | 1 Online-Ressource (xvi, 555 pages) |
ISBN: | 9781804618950 1804618950 9781804613672 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-089794893 | ||
003 | DE-627-1 | ||
005 | 20240228121916.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230322s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781804618950 |c electronic bk. |9 978-1-80461-895-0 | ||
020 | |a 1804618950 |c electronic bk. |9 1-80461-895-0 | ||
020 | |a 9781804613672 |9 978-1-80461-367-2 | ||
035 | |a (DE-627-1)089794893 | ||
035 | |a (DE-599)KEP089794893 | ||
035 | |a (ORHE)9781804613672 | ||
035 | |a (DE-627-1)089794893 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230131 | |
100 | 1 | |a Rains, Tim |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity threats, malware trends, and strategies |b discover risk mitigation strategies for modern threats to your organization |c Tim Rains ; foreword by Timothy Youngblood |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2023 | |
300 | |a 1 Online-Ressource (xvi, 555 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Expert insight | |
500 | |a Includes bibliographical references and index | ||
520 | |a Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Malware (Computer software) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a Youngblood, Timothy |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781804613672/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-089794893 |
---|---|
_version_ | 1835903132669837313 |
adam_text | |
any_adam_object | |
author | Rains, Tim |
author2 | Youngblood, Timothy |
author2_role | ctb |
author2_variant | t y ty |
author_facet | Rains, Tim Youngblood, Timothy |
author_role | aut |
author_sort | Rains, Tim |
author_variant | t r tr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)089794893 (DE-599)KEP089794893 (ORHE)9781804613672 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03121cam a22005052c 4500</leader><controlfield tag="001">ZDB-30-ORH-089794893</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121916.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230322s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804618950</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-80461-895-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1804618950</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-80461-895-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804613672</subfield><subfield code="9">978-1-80461-367-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794893</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089794893</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781804613672</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794893</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230131</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rains, Tim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity threats, malware trends, and strategies</subfield><subfield code="b">discover risk mitigation strategies for modern threats to your organization</subfield><subfield code="c">Tim Rains ; foreword by Timothy Youngblood</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 555 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Expert insight</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Youngblood, Timothy</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781804613672/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-089794893 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:14:25Z |
institution | BVB |
isbn | 9781804618950 1804618950 9781804613672 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 555 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing Ltd. |
record_format | marc |
series2 | Expert insight |
spelling | Rains, Tim VerfasserIn aut Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization Tim Rains ; foreword by Timothy Youngblood Second edition. Birmingham, UK Packt Publishing Ltd. 2023 1 Online-Ressource (xvi, 555 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Expert insight Includes bibliographical references and index Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. Computer security Cyberterrorism Malware (Computer software) Sécurité informatique Cyberterrorisme Logiciels malveillants Youngblood, Timothy MitwirkendeR ctb |
spellingShingle | Rains, Tim Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization Computer security Cyberterrorism Malware (Computer software) Sécurité informatique Cyberterrorisme Logiciels malveillants |
title | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization |
title_auth | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization |
title_exact_search | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization |
title_full | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization Tim Rains ; foreword by Timothy Youngblood |
title_fullStr | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization Tim Rains ; foreword by Timothy Youngblood |
title_full_unstemmed | Cybersecurity threats, malware trends, and strategies discover risk mitigation strategies for modern threats to your organization Tim Rains ; foreword by Timothy Youngblood |
title_short | Cybersecurity threats, malware trends, and strategies |
title_sort | cybersecurity threats malware trends and strategies discover risk mitigation strategies for modern threats to your organization |
title_sub | discover risk mitigation strategies for modern threats to your organization |
topic | Computer security Cyberterrorism Malware (Computer software) Sécurité informatique Cyberterrorisme Logiciels malveillants |
topic_facet | Computer security Cyberterrorism Malware (Computer software) Sécurité informatique Cyberterrorisme Logiciels malveillants |
work_keys_str_mv | AT rainstim cybersecuritythreatsmalwaretrendsandstrategiesdiscoverriskmitigationstrategiesformodernthreatstoyourorganization AT youngbloodtimothy cybersecuritythreatsmalwaretrendsandstrategiesdiscoverriskmitigationstrategiesformodernthreatstoyourorganization |