Описание: While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and servicesSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.
Автор: Mark Talabis Название: Information Security Risk Assessment Toolkit, ISBN: 1597497355 ISBN-13(EAN): 9781597497350 Издательство: Elsevier Science Рейтинг: Цена: 3577 р. 3974.00-10% Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkitgives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
Описание: Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.
Автор: Evan Wheeler Название: Security Risk Management, ISBN: 1597496154 ISBN-13(EAN): 9781597496155 Издательство: Elsevier Science Рейтинг: Цена: 3577 р. 3974.00-10% Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.
Описание: Praise for Cyber Threat! How to Manage the Growing Risk of Cyber Attacks Don Ulsch is one of those rare cyber security experts who understands not only the technical issues involved in dealing with all manner of cyber threats and risks, but he also has
Автор: F., Tipton (cissp, Harold) Название: Information security management handbook ISBN: 0849374952 ISBN-13(EAN): 9780849374951 Издательство: Taylor&Francis Рейтинг: Цена: 20900 р. Наличие на складе: Невозможна поставка.
Описание: Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, this book explores topics ranging from risk assessments, metrics, to standards, and business continuity and disaster recovery.
Автор: Kang Название: Responsive Security ISBN: 1466584300 ISBN-13(EAN): 9781466584303 Издательство: Taylor&Francis Рейтинг: Цена: 5955 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today’s information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.
Описание: The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.
Автор: Stapleton Название: Security without Obscurity ISBN: 1466592141 ISBN-13(EAN): 9781466592148 Издательство: Taylor&Francis Рейтинг: Цена: 8150 р. Наличие на складе: Невозможна поставка.
Описание: The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author’s knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics.Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.
Автор: Fay Название: Contemporary Security Management 2E ISBN: 075067928X ISBN-13(EAN): 9780750679282 Издательство: Elsevier Science Рейтинг: Цена: 6166 р. Наличие на складе: Невозможна поставка.
Описание: Designed to provide the facts on modern practices to efficiently and effectively run a security department, this book covers such topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management.
This book constitutes the refereed proceedings of the 10th IFIP WG 6.6
International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, held in Munich, Germany, in June 2016.
The 7 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The volume also includes 9 papers presented at the AIMS PhD workshop. They were reviewed in a separate process and selected from 21 submissions. The full papers are organized in topical sections on autonomic and smart management and security attacks and defenses. The workshop papers are organized in topical sections on management of future networks and security management. The short papers deal with methods for management and security.
Описание: A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this work forms the basis on which all IT
security programs and certifications are created. Considered the gold-standard reference of Information Security, the 2009 CD-Rom edition includes coverage of each domain of the
Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the
technology field, this CD is revised annually, keeping IT professionals updated and current in their field and on the job.
A print version is also available.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru