Cybersecurity for Beginners

Nonfiction, Art & Architecture, Architecture, Design & Drafting, Computers, Internet, Security, Networking & Communications, Computer Security
Cover of the book Cybersecurity for Beginners by Raef Meeuwisse, Cyber Simplicity Ltd
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Raef Meeuwisse ISBN: 9781911452157
Publisher: Cyber Simplicity Ltd Publication: March 14, 2017
Imprint: Language: English
Author: Raef Meeuwisse
ISBN: 9781911452157
Publisher: Cyber Simplicity Ltd
Publication: March 14, 2017
Imprint:
Language: English

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.

‘The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.’

ALSO featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.

This is the second edition of this book with updates and additional content.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.

‘The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.’

ALSO featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.

This is the second edition of this book with updates and additional content.

More books from Computer Security

Cover of the book Instant Citrix Security How-to by Raef Meeuwisse
Cover of the book Designing Hyper-V Solutions by Raef Meeuwisse
Cover of the book Information Security and Privacy by Raef Meeuwisse
Cover of the book Web Application Security, A Beginner's Guide by Raef Meeuwisse
Cover of the book Bitcoin Explained: Become A Bitcoin Millionaire In 2018 by Raef Meeuwisse
Cover of the book Evolution of Cyber Technologies and Operations to 2035 by Raef Meeuwisse
Cover of the book Juniper(r) Networks Secure Access SSL VPN Configuration Guide by Raef Meeuwisse
Cover of the book Seven Deadliest Microsoft Attacks by Raef Meeuwisse
Cover of the book Webseiten erstellen ohne Rechts.Stress by Raef Meeuwisse
Cover of the book Designing an IAM Framework with Oracle Identity and Access Management Suite by Raef Meeuwisse
Cover of the book Eleventh Hour CISSP® by Raef Meeuwisse
Cover of the book Network Vulnerability Assessment by Raef Meeuwisse
Cover of the book Secondary Liability of Internet Service Providers by Raef Meeuwisse
Cover of the book Linux Mint 19: Desktops and Administration by Raef Meeuwisse
Cover of the book Improving Information Security Practices through Computational Intelligence by Raef Meeuwisse
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy