Singh, Ajay - 2020 - 1st ed.
Cover -- Contents -- List of Figures -- List of Tables -- List of Abbreviations -- Foreword -- Preface -- Introduction -- Part 1: Identifying Cyber Threats and Vulnerabilities -- 1 Cyberattack Surface: Threats and Vulnerabilities -- 2 Recognizing Your Vulnerabilities -- 3 Apps: Can They Land You...