LEADER 00645nam0 2200217 450 001 000009731 005 20180627125355.0 100 $a20080411d1960----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa-------001-y 200 1 $a<>marine corrosion handbook$fT. Howard Rogers 210 $aNew York [etc.]$cMcGraw-Hill Company of Canada$dc1960 215 $aXXI, 297 p.$cill.$d21 cm 676 $a691$v20 700 1$aRogers,$bT. Howard$01732 801 0$aIT$bUNIPARTHENOPE$c20080411$gRICA$2UNIMARC 912 $a000009731 951 $a691/100$b16231$cPIST 996 $aMarine corrosion handbook$9106898 997 $aUNIPARTHENOPE LEADER 01001cam a2200217 i 4500 001 991001931329707536 008 061103s2001 it 000 0 mul d 020 $a8879610198 035 $ab13449898-39ule_inst 040 $aDip.to Filologia Class. e Scienze Filosofiche$bita 111 2 $aIncontro di studiosi dell'antichità cristiana$n<29 :$d2000 :$cRoma>$0424335 245 10$aPietro e Paolo :$bil loro rapporto con Roma nelle testimonianze antiche : XXIX Incontro di studiosi dell'antichità cristiana, Roma, 4-6 maggio 2000 260 $aRoma :$bInstitutum Patristicum Augustinianum,$c2001 300 $a617 p. ;$c24 cm 440 0$aStudia ephemeridis Augustinianum ;$v74 907 $a.b13449898$b02-04-14$c03-11-06 912 $a991001931329707536 945 $aLE007 220 PIE 01.01$g1$i2007000112410$lle007$nLE007 2006 Ugenti$op$pE62.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i14332917$z11-12-06 996 $aPietro e Paolo$91098817 997 $aUNISALENTO 998 $ale007$b03-11-06$cm$da $e-$fmul$git $h0$i0 LEADER 03890nam 22005775 450 001 9911035049303321 005 20251028120421.0 010 $a9798868817090 024 7 $a10.1007/979-8-8688-1709-0 035 $a(CKB)41826744400041 035 $a(MiAaPQ)EBC32379812 035 $a(Au-PeEL)EBL32379812 035 $a(CaSebORM)9798868817090 035 $a(DE-He213)979-8-8688-1709-0 035 $a(EXLCZ)9941826744400041 100 $a20251028d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAttack Vectors $eThe History of Cybersecurity /$fby Morey Haber 205 $a1st ed. 2025. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2025. 215 $a1 online resource (306 pages) 225 1 $aProfessional and Applied Computing Series 311 08$a9798868817083 327 $aChapter 1: The History of Attack Vectors -- Chapter 2: Business Justification -- Chapter 3: Definitions -- Chapter 4: Malware -- Chapter 5: Exploits -- Chapter 6: Breaches -- Chapter 7: Regulations -- Chapter 8: People -- Chapter 9: Syndicates -- Chapter 10: Social Engineering -- Chapter 11: Solutions -- Chapter 12: The Human Threat -- Chapter 13: Lateral Movement -- Chapter 14: Return on Investment -- Chapter 15: It?s Not If, But When -- Chapter 16: Supply Chain Attacks -- Chapter 17: Been Hacked? -- Chapter 18: History Lesson -- Chapter 19: Conclusion. 330 $aFrom early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity?s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet?s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today?s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. You?ll Learn: Understand the history of cyber-security from the early 1950?s through today. Explore the history of terminology that defines the threat landscape. Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years. Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors. Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves. Who This Book Is For? New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security. 410 0$aProfessional and Applied Computing Series 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aComputers$xHistory 606 $aData and Information Security 606 $aPrivacy 606 $aHistory of Computing 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 0$aComputers$xHistory. 615 14$aData and Information Security. 615 24$aPrivacy. 615 24$aHistory of Computing. 676 $a005.8 700 $aHaber$b Morey$01854526 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911035049303321 996 $aAttack Vectors$94451879 997 $aUNINA