The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Redux Books, Grand Rapids, MI, USA
Paperback. Zustand: Very Good. Paperback. Pages are clean and unmarked. Covers show very minor shelving wear.; 100% Satisfaction Guaranteed! Ships same or next business day! Bestandsnummer des Verkäufers 132502250028
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 47192389
Anzahl: 1 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New. Bestandsnummer des Verkäufers 47192389-n
Anzahl: 1 verfügbar
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Paperback. Zustand: new. Paperback. The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9781725350151
Anbieter: Rarewaves USA, OSWEGO, IL, USA
Paperback. Zustand: New. Bestandsnummer des Verkäufers LU-9781725350151
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
Paperback. Zustand: New. Bestandsnummer des Verkäufers LU-9781725350151
Anzahl: 1 verfügbar
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Zustand: New. Bestandsnummer des Verkäufers V9781725350151
Anzahl: 20 verfügbar
Anbieter: Russell Books, Victoria, BC, Kanada
paperback. Zustand: New. Special order direct from the distributor. Bestandsnummer des Verkäufers ING9781725350151
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 160 pages. 9.00x6.00x0.25 inches. In Stock. Bestandsnummer des Verkäufers x-1725350157
Anzahl: 2 verfügbar
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 47192389
Anzahl: 1 verfügbar