MARC details
000 -LEADER |
fixed length control field |
02388nam a22003137a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241127181303.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
241125b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789361598777 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
IIITD |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
SPA-C |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Spafford, Eugene H. |
245 ## - TITLE STATEMENT |
Title |
Cybersecurity myths and misconceptions : |
Remainder of title |
avoiding the hazards and pitfalls that derail us |
Statement of responsibility, etc |
by Eugene H. Spafford, Leigh Metcalf and Josiah Dykstra |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Noida : |
Name of publisher, distributor, etc |
Pearson, |
Date of publication, distribution, etc |
©2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxv, 380 p. : |
Other physical details |
ill. ; |
Dimensions |
23 cm. |
501 ## - WITH NOTE |
With note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Part I. General issues. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Part II. Human issues. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Part III. Contextual issues. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Part IV. Data issues. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses."-- |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cybersecurity |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Malware |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Metcalf, Leigh |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Dykstra, Josiah |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Spafford, Pattie |
Relator term |
illustrator |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
Source of classification or shelving scheme |
Dewey Decimal Classification |