Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Building a Comprehensive IT Security Program, Wittkop


Варианты приобретения
Цена: 5170.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Wittkop
Название:  Building a Comprehensive IT Security Program
ISBN: 9781484220528
Издательство: Springer
Классификация:



ISBN-10: 1484220528
Обложка/Формат: Paperback
Страницы: 195
Вес: 0.43 кг.
Дата издания: 2016
Язык: English
Иллюстрации: 5 black & white illustrations, 8 colour illustrations, biography
Размер: 180 x 255 x 19
Читательская аудитория: Professional & vocational
Основная тема: Professional Computing
Подзаголовок: Practical Guidelines and Best Practices
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:Who is attempting to steal information and why?What are critical information assets?How are effective programs built?How is stolen information capitalized?How do we shift the paradigm to better protect our organizations?How we can make the cyber world safer for everyone to do business?
Дополнительное описание: Chapter 1: The Problem We Are Facing.- Chapter 2 : Protecting Critical Assets.- Chapter 3: Monetizing Risk.- Chapter 4: Security Intelligence Model.- Chapter 5: Incident Response Planning.- Chapter 6: The People Problem.- Chapter 7: Assigning Accountabil



The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 1584.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Security Engineering: A Guide to Building Dependable Distributed Systems

Автор: Ross J. Anderson
Название: Security Engineering: A Guide to Building Dependable Distributed Systems
ISBN: 0471389226 ISBN-13(EAN): 9780471389224
Издательство: Wiley
Цена: 6732.00 р.
Наличие на складе: Поставка под заказ.

Network security with openssl

Автор: Viega, Jon Messier, Matt Chandra, Pravir
Название: Network security with openssl
ISBN: 059600270X ISBN-13(EAN): 9780596002701
Издательство: Wiley
Рейтинг:
Цена: 5067.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This volume is designed to enable developers to use The OpenSSL library more effectively. It offers guidance on avoiding pitfalls, while taking advantage of the library`s advanced features and provides the information necessary to use OpenSSL safely and effectively.

Applied Network Security Monitoring,

Автор: Chris Sanders
Название: Applied Network Security Monitoring,
ISBN: 0124172083 ISBN-13(EAN): 9780124172081
Издательство: Elsevier Science
Рейтинг:
Цена: 6736.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.

Building Ontologies with Basic Formal Ontology

Автор: Arp Robert, Smith Barry, Spear Andrew D.
Название: Building Ontologies with Basic Formal Ontology
ISBN: 0262527812 ISBN-13(EAN): 9780262527811
Издательство: MIT Press
Рейтинг:
Цена: 5925.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

An introduction to the field of applied ontology with examples derived particularly from biomedicine, covering theoretical components, design practices, and practical applications.

In the era of "big data," science is increasingly information driven, and the potential for computers to store, manage, and integrate massive amounts of data has given rise to such new disciplinary fields as biomedical informatics. Applied ontology offers a strategy for the organization of scientific information in computer-tractable form, drawing on concepts not only from computer and information science but also from linguistics, logic, and philosophy. This book provides an introduction to the field of applied ontology that is of particular relevance to biomedicine, covering theoretical components of ontologies, best practices for ontology design, and examples of biomedical ontologies in use.

After defining an ontology as a representation of the types of entities in a given domain, the book distinguishes between different kinds of ontologies and taxonomies, and shows how applied ontology draws on more traditional ideas from metaphysics. It presents the core features of the Basic Formal Ontology (BFO), now used by over one hundred ontology projects around the world, and offers examples of domain ontologies that utilize BFO. The book also describes Web Ontology Language (OWL), a common framework for Semantic Web technologies. Throughout, the book provides concrete recommendations for the design and construction of domain ontologies.

Impacts and Risk Assessment of Technology for Internet Security

Автор: Charles A. Shoniregun
Название: Impacts and Risk Assessment of Technology for Internet Security
ISBN: 1461498910 ISBN-13(EAN): 9781461498919
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

Unmasking the Social Engineer: The Human Element of Security

Автор: Hadnagy Christopher
Название: Unmasking the Social Engineer: The Human Element of Security
ISBN: 1118608577 ISBN-13(EAN): 9781118608579
Издательство: Wiley
Рейтинг:
Цена: 4435.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets.

Information and Communications Security

Автор: Sihan Qing; Chris J. Mitchell; Guilin Wang
Название: Information and Communications Security
ISBN: 3642111440 ISBN-13(EAN): 9783642111440
Издательство: Springer
Рейтинг:
Цена: 14673.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: 11th International Conference ICICS 2009. .

Critical Information Infrastructures Security

Автор: Bernhard H?mmerli
Название: Critical Information Infrastructures Security
ISBN: 3540890955 ISBN-13(EAN): 9783540890959
Издательство: Springer
Рейтинг:
Цена: 10480.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection.

Building a Practical Information Security Program

Автор: David Guretz
Название: Building a Practical Information Security Program
ISBN: 0128020423 ISBN-13(EAN): 9780128020425
Издательство: Elsevier Science
Рейтинг:
Цена: 8588.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: "

Building a Practical Information Security Program" provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided will enable both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter enables aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business.

The book helps users resolve immediate tactical needs, transform security needs into strategic goals, and ultimately put programs into operation with full lifecycle management. Readers will learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risk.

There is so much noise, marketing, and fear in the industry now that spending and deploying based on generic products and standards is often fruitless and a costly waste of time and energy. This book shows users how to properly plan and implement an infosec program based on business strategy and results.
Provides a roadmap on how to build a security program that will protect companies from intrusionShows how to focus the security program on its essential mission and move past FUD (fear, uncertainty, and doubt) to provide business valueTeaches how to build consensus with an effective business-focused programPresents readers with best practices on how to translate technical challenges into business requirements, understand when to go big or go home, how to explore in-depth defense strategies, and how to know when to absorb risk

Information Security Risk Assessment Toolkit,

Автор: Mark Talabis
Название: Information Security Risk Assessment Toolkit,
ISBN: 1597497355 ISBN-13(EAN): 9781597497350
Издательство: Elsevier Science
Рейтинг:
Цена: 6736.00 р.
Наличие на складе: Поставка под заказ.

Описание: Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия