000 01933cam a2200373 a 4500
999 _c7016
_d7016
001 587130786
005 20210427095256.0
008 100713s2011 inua 001 0 eng
010 _a2010932423
020 _a9780470639559 (pbk : alk. paper)
020 _a0470639555 (pbk : alk. paper)
040 _aDLC
_cDLC
_dUKM
_dBTCTA
_dYDXCP
_dVP@
_dSINLB
_dBWX
_dDAY
_dVRC
_dCDX
_dUKMGB
_dBDX
_dCLT
_erda
050 0 0 _aQA76.9.A25
_bH6976 2011
082 0 4 _a005.8
_bH.D.S
_222
100 1 _aHoward, Doug.
245 1 0 _aSecurity 2020 :
_breduce security risks this decade /
_cDoug Howard and Kevin Prince ; [foreword by security ex.
250 _aFirst Edition.
264 1 _aIndianapolis, IN :
_bWiley Pub.,
_cc2011.
300 _axxvi, 305 pages. :
_billustrations ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
500 _aIncludes index.
504 _aIncludes bibliographical references and index.
505 0 _aChapter 1 What Has History Shown Us? - Chapter 2 External Infl uences on Security - Chapter 3 Technology Infl uences on Security - Chapter 4 Where Security Threats Will Come from in the Future - Chapter 5 Secure Communications and Collaboration - Chapter 6 2020 Revolution or Evolution? - Chapter 7 Security as a Business Now and Then - Chapter 8 Impact of the Economy over the Next 10 Years - Chapter 9 Eleven (Maybe Not So Crazy) Scenarios That Could - Chapter 10 Conclusion - Appendix Contributing Author Biographies 265
520 _aProvides a history of computer security breaches, explores current and future threats, and offers information on how to combat security risks.
650 0 _aComputer security.
650 0 _aComputer security
_xForecasting.
700 1 _aPrince, Kevin.
856 _3Abstract
_uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3465
942 _cBK
_2ddc