| 000 | 01933cam a2200373 a 4500 | ||
|---|---|---|---|
| 999 |
_c7016 _d7016 |
||
| 001 | 587130786 | ||
| 005 | 20210427095256.0 | ||
| 008 | 100713s2011 inua 001 0 eng | ||
| 010 | _a2010932423 | ||
| 020 | _a9780470639559 (pbk : alk. paper) | ||
| 020 | _a0470639555 (pbk : alk. paper) | ||
| 040 |
_aDLC _cDLC _dUKM _dBTCTA _dYDXCP _dVP@ _dSINLB _dBWX _dDAY _dVRC _dCDX _dUKMGB _dBDX _dCLT _erda |
||
| 050 | 0 | 0 |
_aQA76.9.A25 _bH6976 2011 |
| 082 | 0 | 4 |
_a005.8 _bH.D.S _222 |
| 100 | 1 | _aHoward, Doug. | |
| 245 | 1 | 0 |
_aSecurity 2020 : _breduce security risks this decade / _cDoug Howard and Kevin Prince ; [foreword by security ex. |
| 250 | _aFirst Edition. | ||
| 264 | 1 |
_aIndianapolis, IN : _bWiley Pub., _cc2011. |
|
| 300 |
_axxvi, 305 pages. : _billustrations ; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _aIncludes index. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aChapter 1 What Has History Shown Us? - Chapter 2 External Infl uences on Security - Chapter 3 Technology Infl uences on Security - Chapter 4 Where Security Threats Will Come from in the Future - Chapter 5 Secure Communications and Collaboration - Chapter 6 2020 Revolution or Evolution? - Chapter 7 Security as a Business Now and Then - Chapter 8 Impact of the Economy over the Next 10 Years - Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could - Chapter 10 Conclusion - Appendix Contributing Author Biographies 265 | |
| 520 | _aProvides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer security _xForecasting. |
|
| 700 | 1 | _aPrince, Kevin. | |
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3465 |
||
| 942 |
_cBK _2ddc |
||