| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911007472603321 |
|
|
Autore |
Nardone Massimo |
|
|
Titolo |
Cybersecurity Threats and Attacks in the Gaming Industry : Secure Game Players' and Developers' Data and Systems / / by Massimo Nardone |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 106 p. 4 illus.) |
|
|
|
|
|
|
Collana |
|
Apress Pocket Guides, , 3004-9288 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Internet - Security measures |
Cyberterrorism |
Video games industry |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Chapter 1: Introduction of Cybersecurity in the Gaming Industry -- Chapter 2: Key aspects of Cybersecurity in Gaming Industry -- Chapter 3: Games Target of Cybersecurity Attacks -- Chapter 4: Cybersecurity Threats & Attacks in Gaming Industry. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment. This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant, educate themselves about potential threats, and employ best practices to ensure a safe and enjoyable gaming experience. We will describe the most common type of targeted games facing cybersecurity attacks as well as some of the most common types of cyber threats faced by the gaming industry such as malware, distributed denial of service (DDoS) attacks, data breaches, etc. |
|
|
|
|
|
|
|
| |