The Resource Cyber attacks and security breaches : coping with external threats, (online streaming)

Cyber attacks and security breaches : coping with external threats, (online streaming)

Label
Cyber attacks and security breaches : coping with external threats
Title
Cyber attacks and security breaches
Title remainder
coping with external threats
Contributor
Subject
Language
eng
Summary
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure
Cataloging source
UtOrBLW
Characteristic
videorecording
Date time place
Originally produced by SmartPros in 2012
http://library.link/vocab/relatedWorkOrContributorName
Kanopy (Firm)
Runtime
25
http://library.link/vocab/subjectName
  • Business enterprises
  • Computer science
  • Economics
  • Cyberterrorism
  • Computer crimes
Technique
live action
Label
Cyber attacks and security breaches : coping with external threats, (online streaming)
Link
Instantiates
Publication
Note
Title from title frames
Antecedent source
unknown
Carrier category
online resource
Carrier MARC source
rdacarrier
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type MARC source
rdacontent
Control code
kan1089883
Dimensions
unknown
Extent
1 online resource (1 video file, approximately 26 min.)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Medium for sound
other
Other physical details
digital, .flv file, sound
Publisher number
1089883
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • other
  • remote
System control number
(OCoLC)897770048
System details
Mode of access: World Wide Web
Video recording format
other
Label
Cyber attacks and security breaches : coping with external threats, (online streaming)
Link
Publication
Note
Title from title frames
Antecedent source
unknown
Carrier category
online resource
Carrier MARC source
rdacarrier
Configuration of playback channels
unknown
Content category
two-dimensional moving image
Content type MARC source
rdacontent
Control code
kan1089883
Dimensions
unknown
Extent
1 online resource (1 video file, approximately 26 min.)
File format
unknown
Form of item
online
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Medium for sound
other
Other physical details
digital, .flv file, sound
Publisher number
1089883
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
sound
Sound on medium or separate
sound on medium
Specific material designation
  • other
  • remote
System control number
(OCoLC)897770048
System details
Mode of access: World Wide Web
Video recording format
other

Library Locations

    • Lionel Bowen Library and Community CentreBorrow it
      669-673 Anzac Parade, Marouba, NSW, 2035, AU
      -33.938111 151.237977
Processing Feedback ...