skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches. Preview this item
ClosePreview this item
Checking...

Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches.

Author: Erdal Ozkaya; Milad Aslaner
Publisher: Birmingham : Packt Publishing Ltd, 2019.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Erdal Ozkaya; Milad Aslaner
ISBN: 9781788831734 178883173X
OCLC Number: 1086102935
Description: 1 online resource (300 pages)

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1086102935<\/a>> # Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1086102935<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Place\/birmingham<\/a>> ; # Birmingham<\/span>\n\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Warning: This malformed URI has been treated as a string - \'https:\/\/img1.od-cdn.com\/ImageType-100\/6135-1\/{4F6487E7-7302-43E6-B195-282EAF9EE0F0}Img100.jpg\'<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/internet_security_measures<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/cyber_intelligence_computer_security<\/a>> ; # Cyber intelligence (Computer security)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/computers_security_networking<\/a>> ; # COMPUTERS--Security--Networking<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/computer_networks_security_measures_management<\/a>> ; # Computer networks--Security measures--Management<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/financial_institutions_effect_of_technological_innovations_on<\/a>> ; # Financial institutions--Effect of technological innovations on<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Person\/aslaner_milad<\/a>> ; # Milad Aslaner<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Person\/ozkaya_erdal<\/a>> ; # Erdal Ozkaya<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/8926467841<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1086102935<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1086102935#PublicationEvent\/birmingham_packt_publishing_ltd_2019<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Agent\/packt_publishing_ltd<\/a>> ; # Packt Publishing Ltd<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5675582<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781788831734<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/samples.overdrive.com\/?crid=4f6487e7-7302-43e6-b195-282eaf9ee0f0&.epub-sample.overdrive.com<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> \"https:\/\/img1.od-cdn.com\/ImageType-100\/6135-1\/{4F6487E7-7302-43E6-B195-282EAF9EE0F0}Img100.jpg<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.overdrive.com\/search?q=4F6487E7-7302-43E6-B195-282EAF9EE0F0<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2018968<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781788831734<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1086102935<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Agent\/packt_publishing_ltd<\/a>> # Packt Publishing Ltd<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Packt Publishing Ltd<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Person\/aslaner_milad<\/a>> # Milad Aslaner<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Aslaner<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Milad<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Milad Aslaner<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Person\/ozkaya_erdal<\/a>> # Erdal Ozkaya<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Ozkaya<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Erdal<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Erdal Ozkaya<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Place\/birmingham<\/a>> # Birmingham<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Birmingham<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/computer_networks_security_measures_management<\/a>> # Computer networks--Security measures--Management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures--Management<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/computers_security_networking<\/a>> # COMPUTERS--Security--Networking<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--Networking<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/cyber_intelligence_computer_security<\/a>> # Cyber intelligence (Computer security)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyber intelligence (Computer security)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/financial_institutions_effect_of_technological_innovations_on<\/a>> # Financial institutions--Effect of technological innovations on<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Financial institutions--Effect of technological innovations on<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Topic\/internet_security_measures<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/enk<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"enk<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781788831734<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"178883173X<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781788831734<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1086102935<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1086102935<\/a>> ; # Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services from Security Breaches.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-01-10<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1086102935#PublicationEvent\/birmingham_packt_publishing_ltd_2019<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Place\/birmingham<\/a>> ; # Birmingham<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8926467841#Agent\/packt_publishing_ltd<\/a>> ; # Packt Publishing Ltd<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n