logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) A history of cybersecurity attacks : 1980 to present by Bruce Middleton ISBN 9781351651905, 9781498785860, 1351651900, 1498785867

  • SKU: EBN-6637832
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.3

12 reviews
Instant download (eBook) A history of cybersecurity attacks : 1980 to present after payment.
Authors:Bruce Middleton
Pages:253 pages.
Year:2017
Editon:1
Publisher:Auerbach Publications;CRC Press
Language:english
File Size:6.2 MB
Format:pdf
ISBNS:9781351651905, 9781498785860, 1351651900, 1498785867
Categories: Ebooks

Product desciption

(Ebook) A history of cybersecurity attacks : 1980 to present by Bruce Middleton ISBN 9781351651905, 9781498785860, 1351651900, 1498785867

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a "lessons learned and recommendations" section.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products

-20%

(Ebook) 65a90d5c60c5c by Middleton, Bruce

5.0

32 reviews
$40 $32