Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber Strategy, Siegel, Carol A. , Sweeney, Mark


Варианты приобретения
Цена: 6123.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Siegel, Carol A. , Sweeney, Mark
Название:  Cyber Strategy
ISBN: 9780367339456
Издательство: Taylor&Francis
Классификация:

ISBN-10: 0367339455
Обложка/Формат: Paperback
Страницы: 220
Вес: 0.34 кг.
Дата издания: 13.04.2020
Язык: English
Иллюстрации: 56 tables, black and white; 116 illustrations, black and white
Размер: 155 x 234 x 18
Читательская аудитория: Tertiary education (us: college)
Основная тема: Computing & IT Security
Подзаголовок: Risk-Driven Security and Resiliency
Рейтинг:
Поставляется из: Европейский союз
Описание: Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency Strategy. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation).


Cyber Strategy

Автор: Siegel, Carol A. , Sweeney, Mark
Название: Cyber Strategy
ISBN: 0367458179 ISBN-13(EAN): 9780367458171
Издательство: Taylor&Francis
Рейтинг:
Цена: 16078.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency Strategy. The book discusses all the steps required from conception of the plan from pre-planning (mission/vision, principles, strategic objectives, new initiatives derivation).

Judiciary-Friendly Forensics Of Software Copyright Infringement

Автор: Bhattathiripad
Название: Judiciary-Friendly Forensics Of Software Copyright Infringement
ISBN: 1466658045 ISBN-13(EAN): 9781466658042
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The software industry continues to expand as new products enter into the technological marketplace in order to meet increasing demand. As a result of the popularity of often-expensive software products, companies face the growing challenge of protecting their products against copyright infringement.Judiciary-Friendly Forensics of Software Copyright Infringement discusses the forensics of software copyright infringement. This book highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and eliminate software piracy. As this publication will explore comprehensive topics on the forensic process of software piracy, it is an essential resource for software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, software developers, and students.

Security, Trust, And Regulatory Aspects Of Cloud Computing In Business Environments

Автор: Srinivasan
Название: Security, Trust, And Regulatory Aspects Of Cloud Computing In Business Environments
ISBN: 146665788X ISBN-13(EAN): 9781466657885
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Emerging as an effective alternative to organisation-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software.Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Privacy: Past, Present, and Future

Автор: Leslie N. Gruis
Название: Privacy: Past, Present, and Future
ISBN: 1680531867 ISBN-13(EAN): 9781680531862
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 17550.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Top analyst Leslie Gruis’s timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept.All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.

Research Methods for Cyber Security

Автор: Edgar, Thomas
Название: Research Methods for Cyber Security
ISBN: 0128053496 ISBN-13(EAN): 9780128053492
Издательство: Elsevier Science
Рейтинг:
Цена: 11957.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research.

Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

  • Presents research methods from a cyber security science perspective
  • Catalyzes the rigorous research necessary to propel the cyber security field forward
  • Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
Applied Cyber Security and the Smart Grid,

Автор: Eric D. Knapp
Название: Applied Cyber Security and the Smart Grid,
ISBN: 1597499986 ISBN-13(EAN): 9781597499989
Издательство: Elsevier Science
Рейтинг:
Цена: 7409.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that`s just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

Inside Cyber Warfare: Mapping the Cyber Underworld

Автор: Carr Jeffrey
Название: Inside Cyber Warfare: Mapping the Cyber Underworld
ISBN: 1449310044 ISBN-13(EAN): 9781449310042
Издательство: Wiley
Рейтинг:
Цена: 5701.00 р.
Наличие на складе: Поставка под заказ.

Описание: Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries.

Ccna cyber ops secfnd 210250 & secops 21

Автор: Santos, Omar
Название: Ccna cyber ops secfnd 210250 & secops 21
ISBN: 1587145006 ISBN-13(EAN): 9781587145001
Издательство: Pearson Education
Рейтинг:
Цена: 13159.00 р.
Наличие на складе: Поставка под заказ.

Описание: ITAMOrg(R) IT Hardware Asset Management Certifications is suitable for individuals wanting to demonstrate they have achieved sufficient understanding of how to apply and tailor the Hardware Asset Management practices. Hardware Asset Management (HAM) is important for every organization. Management and control of hardware influences the risk on most asset types such as Software, Cloud & Services and People and Information assets. E.g., if you are not in control of what hardware is in use it is not possible for you to control your software which will result in software license in-compliance and other risks.The Hardware Asset Management Specialist Certification brings participants IT Service Management best practices together with Hardware Asset Management best practices. This will help an organization to implement Hardware Asset Management lifecycle processes and showing how IT Service Management can support HAM lifecycles to be in control and support the other Asset types.The purpose of the ITAMOrg Hardware Asset Management Specialist (HAMS) course and certification is to provide knowledge on best practices and use of Hardware Asset Management (HAM) in the challenges that Hardware Asset Managers face on a daily basis. This certification is based on a practical approach to strengthen the participants understanding of how ISO 55000 and IT Service Management best practice relates to everyday use of HAM, Hardware standards, Hardware lifecycle control, control of retirement and disposal and organizational issues that saturates many businesses in today`s digital world.This Courseware is suited for the ITAMOrg(R) 2020 HAM exam. There is also a sample exam added of the ITAMOrg(R) 2020 Hardware Asset Management in case the participant prefers to refresh its knowledge. The Exam is delivered in English.

Cyber warfare

Название: Cyber warfare
ISBN: 3319140388 ISBN-13(EAN): 9783319140384
Издательство: Springer
Рейтинг:
Цена: 13275.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия