31. Cybersecurity: The Beginner's Guide, A comprehensive guide to getting started in cybersecurity.

Ozkaya, Erdal (2019) 31. Cybersecurity: The Beginner's Guide, A comprehensive guide to getting started in cybersecurity. Packt Publishing, Limited, 2019. ProQuest Ebook Central. ISBN 9781789616194

[img] Text
31. Cybersecurity 1.pdf - Published Version
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 2.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 3.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 4.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
31. Cybersecurity 5.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 6.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 7.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 8.pdf
Restricted to Registered users only

Download (15MB)
[img] Text
31. Cybersecurity 9.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 10.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 11.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 12.pdf
Restricted to Registered users only

Download (5MB)
[img] Text
31. Cybersecurity 13.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 14.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 15.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 16.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 17.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 18.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 19.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 20.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 21.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 22.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 23.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 24.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 25.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 26.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 27.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 28.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 29.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 30.pdf
Restricted to Registered users only

Download (0B)
[img] Text
31. Cybersecurity 31.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 32.pdf
Restricted to Registered users only

Download (286kB)
[img] Text
31. Cybersecurity 33.pdf
Restricted to Registered users only

Download (89MB)
[img] Text
31. Cybersecurity 34.pdf
Restricted to Registered users only

Download (91MB)
[img] Text
31. Cybersecurity 35.pdf
Restricted to Registered users only

Download (89MB)
Official URL: http://ebookcentral.proquest.com/lib/polije-ebooks...

Abstract

Ozkaya, Erdal. Cybersecurity: the Beginner's Guide, Packt Publishing, Limited, 2019. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/polije-ebooks/detail.action?docID=5781046. Created from polije-ebooks on 2020-01-26 23:52:51. There are two types of organizations: those who know they have been hacked and those who don't. Nearly every day there is news about a hacked company, regardless of their size. On the other hand, independent research firms, such as Gartner; Fortune companies, such as Microsoft and Cisco; respected magazines, such as Forbes; global non-profit organizations, such as ISACA; governments; and recruiters are talking about the cybersecurity skill shortage today, and they estimate that the talent gap is in the millions. There are many organizations and individuals that are passionate about closing this gap. There are also possibly endless resources, although very fragmented, on the internet. You will find many books and videos that have the essentials to get you started in cybersecurity, but none of them provide guidance from A to Z on what beginners need to know, what core technology they need to focus on, why they need to have a mentor, how they can network, which certifications they can take, how they can find the resources they need, and finally, how they can find a job. Again, none of the resources have very well-known industry experts, or hiring managers' advice and suggestions on what a beginner needs to do. This beginner's guide explores deep technical content pertaining to cybersecurity; however, it also provides real guidance on how to become a cybersecurity expert. While this book is called a beginner's guide, it also offers a ton of information for professionals who want to switch their careers to cybersecurity.

Item Type: Book
Subjects: 410 - Rumpun Ilmu Teknik > 450 - Teknik Elektro dan Informatika > 459 - Ilmu Komputer
Divisions: Perpustakaan > E-Book
Depositing User: Teguh Widodo
Date Deposited: 25 Nov 2021 01:15
Last Modified: 25 Nov 2021 01:15
URI: https://sipora.polije.ac.id/id/eprint/4180

Actions (login required)

View Item View Item