Scan barcode
![Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray](https://rwszupzmsadbjqghhiwjxwntmpecjm.thestorygraph.com/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBd1lvREE9PSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--e777fccefb2fe8c077712926ff5a89e2a1ab8ab8/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Cybersecurity-%20Managing%20Systems,%20Conducting%20Testing,%20and%20Investigating%20Intrusions.jpg)
362 pages • first pub 2013 (editions)
ISBN/UID: None
Format: Not specified
Language: English
Publisher: Not specified
Publication date: Not specified
Description
A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious ...
Community Reviews
Content Warnings
![Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray](https://rwszupzmsadbjqghhiwjxwntmpecjm.thestorygraph.com/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBd1lvREE9PSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--e777fccefb2fe8c077712926ff5a89e2a1ab8ab8/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Cybersecurity-%20Managing%20Systems,%20Conducting%20Testing,%20and%20Investigating%20Intrusions.jpg)
362 pages • first pub 2013 (editions)
ISBN/UID: None
Format: Not specified
Language: English
Publisher: Not specified
Publication date: Not specified
Description
A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious ...