ISSE 2014 Securing Electronic Business Processes, Helmut Reimer; Norbert Pohlmann; Wolfgang Schneide
Автор: Gheciu, Alexandra Название: Securing Civilization? ISBN: 019921722X ISBN-13(EAN): 9780199217229 Издательство: Oxford Academ Рейтинг: Цена: 14414.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book examines the evolution of security practices carried out in the Euro-Atlantic area in the name of fighting international terrorism. With particular emphasis on three key institutions of the transatlantic security community: the EU, NATO and the OSCE.
Автор: Norbert Pohlmann; Helmut Reimer; Wolfgang Schneide Название: ISSE 2009 Securing Electronic Business Processes ISBN: 3834809586 ISBN-13(EAN): 9783834809582 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Helmut Reimer; Norbert Pohlmann; Wolfgang Schneide Название: ISSE 2013 Securing Electronic Business Processes ISBN: 3658033703 ISBN-13(EAN): 9783658033705 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Sachar Paulus; Norbert Pohlmann; Helmut Reimer Название: ISSE 2004 — Securing Electronic Business Processes ISBN: 3528059109 ISBN-13(EAN): 9783528059101 Издательство: Springer Рейтинг: Цена: 13275.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Helmut Reimer; Norbert Pohlmann; Wolfgang Schneide Название: ISSE 2012 Securing Electronic Business Processes ISBN: 3658003324 ISBN-13(EAN): 9783658003326 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents talks that given at ISSE 2012 - the forum for the discussion of how to adequately secure electronic business processes. In this book, the topics includes such as Information Security Strategy; Enterprise and Cloud Computing Security; Security and Privacy Impact of Green Energy; and Human Factors of IT Security.
Автор: Sachar Paulus; Norbert Pohlmann; Helmut Reimer Название: Securing Electronic Business Processes ISBN: 3528058870 ISBN-13(EAN): 9783528058876 Издательство: Springer Рейтинг: Цена: 10760.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Information Security Название: Securing Intellectual Property, ISBN: 0750679956 ISBN-13(EAN): 9780750679954 Издательство: Elsevier Science Рейтинг: Цена: 8420.00 р. Наличие на складе: Поставка под заказ.
Описание: Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers.
"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation's enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." --John R. Thomas, Colonel, U.S. Army, Retired Former Commander of the DoD, Global Operations and Security Center
Today's e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts tomeet a company's changing security needs.
Topics include:
Security weaknesses
Safeguarding technologies
Countermeasure best practices
Establishing an adaptable e-business security management program
Essential elements of a corporate security management program
Functions, structure, staffing, and contracting considerations in security management
Implementing intrusion detection technology
Designing tomorrow's e-business application for secured operations
Contemporary rationales for justifying increased spending on security programs
Описание: The essential guide to e-business security for managers and IT professionals Securing E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards.
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
Автор: Davis Название: Securing and Controlling Cisco Routers ISBN: 0849312906 ISBN-13(EAN): 9780849312908 Издательство: Taylor&Francis Рейтинг: Цена: 17609.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology and the TCP/IP protocol suite, and covers subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA).
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru