Контакты/Адрес/Проезд   Доставка и Оплата
История
  +7(495) 980-12-10
  10:00-18:00 пн-сб
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Специальные предложения | Бестселлеры
 
Информация
Online Каталоги
Каталог учебной литературы
по английскому языку >>>

Каталог учебной литературы
по английскому языку >>>


IT Security Risk Control Management, Pompon


Варианты приобретения
Цена: 4207р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: 794 шт.  Склад Америка: 68 шт.  
При оформлении заказа до:
Ориентировочная дата поставки:

Добавить в корзину
в Мои желания
Автор: Pompon
Название:  IT Security Risk Control Management
Издательство: Springer
Классификация:
Безопасность сети
Базы данных

ISBN: 1484221397
ISBN-13(EAN): 9781484221396
ISBN: 1-484-22139-7
ISBN-13(EAN): 978-1-484-22139-6
Обложка/Формат: Paperback
Страницы: 311
Вес: 0.686 кг.
Дата издания: 2016
Язык: English
Иллюстрации: 22 black & white illustrations, 11 colour illustrations, biography
Размер: 25.40 x 17.78 x 1.83 cm
Читательская аудитория: Professional & vocational
Основная тема: Professional Computing
Подзаголовок: An Audit Preparation Plan
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking.IT Security Risk Control Management provides step-by-step guidance on how to craft a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats. Readers will understand the paradoxes of information security and discover handy tools that hook security controls into business processes. With this book, you will be able to equip your security program to prepare for and pass such common audits as PCI, SSAE-16 and ISO 27001. In addition, you will learn the depth and breadth of the expertise necessary to become an adaptive and effective security professional. This book:Starts at the beginning of how to approach, scope, and customize a security program to fit an organization.Walks you through how to implement the most challenging processes, pointing out common pitfalls and distractions.Teaches you how to frame security and risk issues to be clear and actionable to decision makers, technical personnel, and users. What you’ll learnHow to organically grow a useful, functional security program appropriate to an organizations culture and requirementsHow to inform, advise, and influence executives, IT staff, and users on information securityHow to think like a seasoned security professional, understanding how cyber-criminals subvert systems with subtle and insidious tricks.How to analyze, select, implement, and monitor security controls such as change control, vulnerability management, incident response, and access controls.How to prepare an organization to pass external formal audits such as PCI, SSAE-16 or ISO 27001How to write clear, easy to follow, comprehensive security policies and proceduresWho This Book Is ForIT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals).
Дополнительное описание: Part I: Getting a Handle on Things.- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization.-




Security, Privacy, Trust, And Resource Management In Mobile And Wireless Communicatio

Автор: Rawat, Bista & Yan
Название: Security, Privacy, Trust, And Resource Management In Mobile And Wireless Communicatio
ISBN: 1466646918 ISBN-13(EAN): 9781466646919
Издательство: Eurospan
Рейтинг:
Цена: 22273 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and servicesSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

Information Security Risk Assessment Toolkit,

Автор: Mark Talabis
Название: Information Security Risk Assessment Toolkit,
ISBN: 1597497355 ISBN-13(EAN): 9781597497350
Издательство: Elsevier Science
Рейтинг:
Цена: 3577 р. 3974.00 -10%
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkitgives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

Access Control Systems / Security, Identity Management and Trust Models

Автор: Benantar Messaoud
Название: Access Control Systems / Security, Identity Management and Trust Models
ISBN: 0387004459 ISBN-13(EAN): 9780387004457
Издательство: Springer
Рейтинг:
Цена: 9349 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.

Security Risk Management,

Автор: Evan Wheeler
Название: Security Risk Management,
ISBN: 1597496154 ISBN-13(EAN): 9781597496155
Издательство: Elsevier Science
Рейтинг:
Цена: 3577 р. 3974.00 -10%
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.

Information Risk Management: How to Control the Growing Risk of Cyber Attacks

Автор: Ulsch MacDonnell
Название: Information Risk Management: How to Control the Growing Risk of Cyber Attacks
ISBN: 1118836359 ISBN-13(EAN): 9781118836354
Издательство: Wiley
Рейтинг:
Цена: 3970 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Praise for Cyber Threat! How to Manage the Growing Risk of Cyber Attacks Don Ulsch is one of those rare cyber security experts who understands not only the technical issues involved in dealing with all manner of cyber threats and risks, but he also has

Information security management handbook

Автор: F., Tipton (cissp, Harold)
Название: Information security management handbook
ISBN: 0849374952 ISBN-13(EAN): 9780849374951
Издательство: Taylor&Francis
Рейтинг:
Цена: 20900 р.
Наличие на складе: Невозможна поставка.

Описание: Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, this book explores topics ranging from risk assessments, metrics, to standards, and business continuity and disaster recovery.

Responsive Security

Автор: Kang
Название: Responsive Security
ISBN: 1466584300 ISBN-13(EAN): 9781466584303
Издательство: Taylor&Francis
Рейтинг:
Цена: 5955 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today’s information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM

Автор: Cohen
Название: IT Security Governance Guidebook with Security Program Metrics on CD-ROM
ISBN: 0849384354 ISBN-13(EAN): 9780849384356
Издательство: Taylor&Francis
Рейтинг:
Цена: р.
Наличие на складе: Поставка под заказ.

Описание: The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

Security without Obscurity

Автор: Stapleton
Название: Security without Obscurity
ISBN: 1466592141 ISBN-13(EAN): 9781466592148
Издательство: Taylor&Francis
Рейтинг:
Цена: 8150 р.
Наличие на складе: Невозможна поставка.

Описание: The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author’s knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics.Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

Contemporary Security Management 2E

Автор: Fay
Название: Contemporary Security Management 2E
ISBN: 075067928X ISBN-13(EAN): 9780750679282
Издательство: Elsevier Science
Рейтинг:
Цена: 6166 р.
Наличие на складе: Невозможна поставка.

Описание: Designed to provide the facts on modern practices to efficiently and effectively run a security department, this book covers such topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management.

Management and Security in the Age of Hyperconnectivity

Автор: Badonnel
Название: Management and Security in the Age of Hyperconnectivity
ISBN: 331939813X ISBN-13(EAN): 9783319398136
Издательство: Springer
Рейтинг:
Цена: 4862 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book constitutes the refereed proceedings of the 10th IFIP WG 6.6
International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, held in Munich, Germany, in June 2016.
The 7 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The volume also includes 9 papers presented at the AIMS PhD workshop. They were reviewed in a separate process and selected from 21 submissions. The full papers are organized in topical sections on autonomic and smart management and security attacks and defenses. The workshop papers are organized in topical sections on management of future networks and security management. The short papers deal with methods for management and security.
Information Security Management Handbook, 2009 CD-ROM Edition

Название: Information Security Management Handbook, 2009 CD-ROM Edition
ISBN: 1420090984 ISBN-13(EAN): 9781420090987
Издательство: Taylor&Francis
Рейтинг:
Цена: 10137 р.
Наличие на складе: Поставка под заказ.

Описание: A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this work forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of Information Security, the 2009 CD-Rom edition includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this CD is revised annually, keeping IT professionals updated and current in their field and on the job.

A print version is also available.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте  Мобильная версия