Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Security 2020 : reduce security risks this decade / Doug Howard and Kevin Prince ; [foreword by security ex.

By: Contributor(s): Material type: TextTextPublisher: Indianapolis, IN : Wiley Pub., c2011Edition: First EditionDescription: xxvi, 305 pages. : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780470639559 (pbk : alk. paper)
  • 0470639555 (pbk : alk. paper)
Subject(s): DDC classification:
  • 005.8 H.D.S 22
LOC classification:
  • QA76.9.A25 H6976 2011
Online resources:
Contents:
Chapter 1 What Has History Shown Us? - Chapter 2 External Infl uences on Security - Chapter 3 Technology Infl uences on Security - Chapter 4 Where Security Threats Will Come from in the Future - Chapter 5 Secure Communications and Collaboration - Chapter 6 2020 Revolution or Evolution? - Chapter 7 Security as a Business Now and Then - Chapter 8 Impact of the Economy over the Next 10 Years - Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could - Chapter 10 Conclusion - Appendix Contributing Author Biographies 265
Summary: Provides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.
Star ratings
    Average rating: 0.0 (0 votes)

Includes index.

Includes bibliographical references and index.

Chapter 1 What Has History Shown Us? - Chapter 2 External Infl uences on Security - Chapter 3 Technology Infl uences on Security - Chapter 4 Where Security Threats Will Come from in the Future - Chapter 5 Secure Communications and Collaboration - Chapter 6 2020 Revolution or Evolution? - Chapter 7 Security as a Business Now and Then - Chapter 8 Impact of the Economy over the Next 10 Years - Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could - Chapter 10 Conclusion - Appendix Contributing Author Biographies 265

Provides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.

There are no comments on this title.

to post a comment.