The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Redux Books, Grand Rapids, MI, Etats-Unis
Paperback. Etat : Very Good. Paperback. Pages are clean and unmarked. Covers show very minor shelving wear.; 100% Satisfaction Guaranteed! Ships same or next business day! N° de réf. du vendeur 132502250028
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 47192389
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 47192389-n
Quantité disponible : 1 disponible(s)
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Paperback. Etat : new. Paperback. The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9781725350151
Quantité disponible : 1 disponible(s)
Vendeur : Rarewaves USA, OSWEGO, IL, Etats-Unis
Paperback. Etat : New. N° de réf. du vendeur LU-9781725350151
Quantité disponible : 1 disponible(s)
Vendeur : Rarewaves.com USA, London, LONDO, Royaume-Uni
Paperback. Etat : New. N° de réf. du vendeur LU-9781725350151
Quantité disponible : 1 disponible(s)
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Etat : New. N° de réf. du vendeur V9781725350151
Quantité disponible : 20 disponible(s)
Vendeur : Russell Books, Victoria, BC, Canada
paperback. Etat : New. Special order direct from the distributor. N° de réf. du vendeur ING9781725350151
Quantité disponible : 2 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 160 pages. 9.00x6.00x0.25 inches. In Stock. N° de réf. du vendeur x-1725350157
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 47192389
Quantité disponible : 1 disponible(s)