
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
• A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession
• Offers practical guidance and actionable steps for individuals and businesses to protect themselves
• Highly accessible and terminology is clearly explained and supported with current, real-world examples
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front Cover
- Half-Title Page
- BCS, The Chartered Institute for It
- Title Page
- Copyright Page
- Dedication
- Contents
- List of figures and tables
- Author
- Acknowledgements
- Preface
- Part I Cyber Security Issues
- Part II Cyber Security Solutions
- Part III Appendices
- Index
- Back Cover