Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Information Security: Cyberattacks, Data Breaches and Security Controls, Paul Scholz


Варианты приобретения
Цена: 32312.00р.
Кол-во:
Наличие:
Добавить в корзину
в Мои желания

Автор: Paul Scholz
Название:  Information Security: Cyberattacks, Data Breaches and Security Controls
ISBN: 9781536158809
Издательство: Nova Science
Классификация:
ISBN-10: 1536158801
Обложка/Формат: Hardback
Страницы: 325
Вес: 0.57 кг.
Дата издания: 30.07.2019
Серия: Computing & IT
Язык: English
Ключевые слова: Computer security
Подзаголовок: Cyberattacks, data breaches and security controls
Рейтинг:
Поставляется из: Англии
Описание: Federal agencies and our nations critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1. The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nations tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRSs fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2. Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems. The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPMs information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agencys security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPMs actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations. CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agencys systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies implementation of the governments approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions. Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.


Автор: Weisbord Noah
Название: The Crime of Aggression: The Quest for Justice in an Age of Drones, Cyberattacks, Insurgents, and Autocrats
ISBN: 069116987X ISBN-13(EAN): 9780691169873
Издательство: Wiley
Рейтинг:
Цена: 5544.00 р.
Наличие на складе: Поставка под заказ.

Описание:

A gripping behind-the-scenes account of the dramatic legal fight to hold leaders personally responsible for aggressive war

On July 17, 2018, starting an unjust war became a prosecutable international crime alongside genocide, crimes against humanity, and war crimes. Instead of collective state responsibility, our leaders are now personally subject to indictment for crimes of aggression, from invasions and preemptions to drone strikes and cyberattacks. The Crime of Aggression is Noah Weisbord's riveting insider's account of the high-stakes legal fight to enact this historic legislation and hold politicians accountable for the wars they start.

Weisbord, a key drafter of the law for the International Criminal Court, takes readers behind the scenes of one of the most consequential legal dramas in modern international diplomacy. Drawing on in-depth interviews and his own invaluable insights, he sheds critical light on the motivations of the prosecutors, diplomats, and military strategists who championed the fledgling prohibition on unjust war--and those who tried to sink it. He untangles the complex history behind the measure, tracing how the crime of aggression was born at the Nuremberg trials only to fall dormant during the Cold War, and he draws lessons from such pivotal events as the collapse of the League of Nations, the rise of the United Nations, September 11, and the war on terror.

The power to try leaders for unjust war holds untold promise for the international order, but also great risk. In this incisive and vitally important book, Weisbord explains how judges in such cases can balance the imperatives of justice and peace, and how the fair prosecution of aggression can humanize modern statecraft.

Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet

Автор: Snowden John
Название: Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet
ISBN: 1801147396 ISBN-13(EAN): 9781801147392
Издательство: Неизвестно
Рейтинг:
Цена: 3573.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you know what is hacking? Do you want to learn about cyber security? Are you unaware of mistakes made in cybersecutity?

This book is for you This book teaches cyber security, how to defend themselves and defend against cyber-attacks. This book covers the latest security threats and defense strategies. Cyber security starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

  • The importance of hacking.
  • Use cyber security kill chain to understand the attack strategy
  • Common cyber attacks
  • Benefits of cyber security.
  • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy
  • Identify different types of cyber-attacks, such as SQL injection, malware and social engineering threats such as phishing emails
  • Weigh the pros and cons of popular cybersecurity strategies of the past two decades
  • Implement and then measure the outcome of a cybersecurity strategy
  • Get an in-depth understanding of the security and hacking.
  • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud
  • Learn demand of cyber security.

This open access book provides an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those problems.

Who this book is for 

For the IT professional venturing into the IT security domain, IT pen testers, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

WHAT ARE YOU WAITING FOR ORDER YOUR COPY NOW......

Data Security Breaches and Privacy in Europe

Автор: Rebecca Wong
Название: Data Security Breaches and Privacy in Europe
ISBN: 1447155858 ISBN-13(EAN): 9781447155850
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered.

Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events

Автор: Thompson Eric C.
Название: Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
ISBN: 1484256077 ISBN-13(EAN): 9781484256077
Издательство: Springer
Рейтинг:
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Beginning-Intermediate user level

Telehealth Security: An Examination of Variance in Telehealth Security Breaches

Автор: Dr. Seria D. Lakes DSc
Название: Telehealth Security: An Examination of Variance in Telehealth Security Breaches
ISBN: 0692291865 ISBN-13(EAN): 9780692291863
Издательство: Неизвестно
Цена: 3102.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy

Автор: Sloan Robert, Warner Richard
Название: Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy
ISBN: 0367787911 ISBN-13(EAN): 9780367787912
Издательство: Taylor&Francis
Рейтинг:
Цена: 3367.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.

Security Breaches and Threat Prevention in the Internet of Things

Автор: Jeyanthi N., Thandeeswaran R.
Название: Security Breaches and Threat Prevention in the Internet of Things
ISBN: 1522522964 ISBN-13(EAN): 9781522522966
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 26195.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Android Apps Security: Mitigate Hacking Attacks and Security Breaches

Автор: Gunasekera Sheran
Название: Android Apps Security: Mitigate Hacking Attacks and Security Breaches
ISBN: 1484216814 ISBN-13(EAN): 9781484216811
Издательство: Springer
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: 1. Introduction.- 2. Recap of Secure Development Principles.- 3. Changes in Security Architecture.- 4. Security when Building Apps to Scale.- 5. Testing the Security of Your App (this covers pentesting and bug bounties).- 6. The Toolbag.- 7. Rooting an Android phone. 8. Looking at your App's Data through a Root shell.- Bypassing SSL Pinning (the holy grail of hacking apps).- 10. Reverse Engineering Android Apps.- 11. Incident Response.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Автор: Michelle Moore
Название: Cybersecurity Breaches and Issues Surrounding Online Threat Protection
ISBN: 1522519416 ISBN-13(EAN): 9781522519416
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents the latest scholarly research on the various types of unauthorized access or damage to electronic data. This publication features extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, and is designed for academics, researchers, computer engineers, graduate students, and practitioners.

Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy

Автор: Robert H. Sloan, Richard Warner
Название: Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy
ISBN: 0815356625 ISBN-13(EAN): 9780815356622
Издательство: Taylor&Francis
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.

Business Continuity in a Cyber World: Surviving Cyberattacks

Автор: Sutton David
Название: Business Continuity in a Cyber World: Surviving Cyberattacks
ISBN: 1947441469 ISBN-13(EAN): 9781947441460
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 2758.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyber-attacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large or small, public or private sector. Cyber security is one aspect of information security, since the impacts or consequences of a cyber-attack will inevitably damage one or more of the three pillars of information security: the confidentiality, integrity or availability of an organization's information assets. The main difference between information security and cyber security is that while information security deals with all types of information assets, cyber security deals purely with those which are accessible by means of interconnected electronic networks, including the Internet. Many responsible organizations now have robust information security, business continuity and disaster recovery programs in place, and it is not the intention of this book to re-write those, but to inform organizations about the kind of precautions they should take to stave off successful cyber-attacks and how they should deal with them when they arise in order to protect the day-to-day businesses.

Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks

Автор: Mandel Robert
Название: Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks
ISBN: 1626164126 ISBN-13(EAN): 9781626164123
Издательство: Неизвестно
Цена: 24128.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. This book offers a strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия