Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Privacy, Regulations, and Cybersecurity: The Essential Business Guide, Moschovitis


Варианты приобретения
Цена: 5542.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Moschovitis
Название:  Privacy, Regulations, and Cybersecurity: The Essential Business Guide
ISBN: 9781119658740
Издательство: Wiley
Классификация:
ISBN-10: 1119658748
Обложка/Формат: Hardcover
Страницы: 256
Вес: 0.67 кг.
Дата издания: 30.03.2021
Язык: English
Размер: 231 x 162 x 41
Читательская аудитория: Professional & vocational
Подзаголовок: The essential business guide
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to

Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what privacy really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.

First, author Chris Moschovitis walks you through our evolving definitions of privacy, from the ancient world all the way to the General Law on Data Protection (GDPR). He then explains--in friendly, accessible language--how to orient your preexisting cybersecurity program toward privacy, and how to make sure your systems are compliant with current regulations.

This book--a sequel to Moschovitis well-received Cybersecurity Program Development for Business--explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, actionable advice on how to avoid dangerous privacy leaks and protect your valuable data assets.

  • Learn how to design your cybersecurity program with privacy in mind
  • Apply lessons from the GDPR and other landmark laws
  • Remain compliant and even get ahead of the curve, as privacy grows from a buzzword to a business must
  • Learn how to protect whats of value to your company and your stakeholders, regardless of business size or industry
  • Understand privacy regulations from a business standpoint, including which regulations apply and what they require
  • Think through what privacy protections will mean in the post-COVID environment

Whether youre new to cybersecurity or already have the fundamentals, this book will help you design and build a privacy-centric, regulation-compliant cybersecurity program.




Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Автор: Dykstra Josiah
Название: Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
ISBN: 1491920947 ISBN-13(EAN): 9781491920947
Издательство: Wiley
Рейтинг:
Цена: 6334.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: If you`re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.

Challenges in Cybersecurity and Privacy - the European Research Landscape

Автор: Jorge Bernal Bernabe, Antonio Skarmeta
Название: Challenges in Cybersecurity and Privacy - the European Research Landscape
ISBN: 8770220883 ISBN-13(EAN): 9788770220880
Издательство: Taylor&Francis
Рейтинг:
Цена: 14086.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

Implementing Cybersecurity

Автор: Kohnke
Название: Implementing Cybersecurity
ISBN: 149878514X ISBN-13(EAN): 9781498785143
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Cybersecurity For Beginners: Discover the Trade`s Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism

Автор: Bogachev Yuri a.
Название: Cybersecurity For Beginners: Discover the Trade`s Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism
ISBN: 3907269578 ISBN-13(EAN): 9783907269572
Издательство: Неизвестно
Рейтинг:
Цена: 1930.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book will help you to become more vigilant and protective of your devices and networks even if you`re an absolute beginner in the world of digital security. Learn how cybercriminals operate, which secret methods they use, what they look for in vulnerabilities, and learn how to avoid being their next victim.

Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En

Автор: Evans Lester
Название: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En
ISBN: 1647482747 ISBN-13(EAN): 9781647482749
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Do you create tons of accounts you will never again visit? Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? Does your password contain a sequence of numbers, such as "123456"? This book will show you just how incredibly lucky you are that nobody`s hacked you before.

Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui

Автор: Evans Lester
Название: Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
ISBN: 1647481740 ISBN-13(EAN): 9781647481742
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...

Two manuscripts in one book:

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner's Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as "123456"?

Do you automatically click all links and download all email attachments coming from your friends?

This book will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

In part 1 of this book, you will learn about:

  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon
  • And much, much more

Some of the topics covered in part 2 of this book include:

  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer's mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi
  • And much, much more

So if you want to learn more about Cybersecurity and Ethical Hacking, scroll up and click "add to cart"

Smart Cities Cybersecurity and Privacy

Автор: Rawat, Danda
Название: Smart Cities Cybersecurity and Privacy
ISBN: 0128150327 ISBN-13(EAN): 9780128150320
Издательство: Elsevier Science
Рейтинг:
Цена: 16505.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents.

Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated.

Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.

  • Consolidates in one place state-of-the-art academic and industry research
  • Provides a holistic and systematic framework for design, evaluating, and deploying the latest security solutions for smart cities
  • Improves understanding and collaboration among all smart city stakeholders to develop more secure smart city architectures
Cybersecurity and Privacy: Bridging the Gap

Автор: Samant Khajuria, Lene Sorensen, Knud Erik Skouby
Название: Cybersecurity and Privacy: Bridging the Gap
ISBN: 8793519664 ISBN-13(EAN): 9788793519664
Издательство: Taylor&Francis
Рейтинг:
Цена: 11023.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Addresses the issue of cybersecurity and privacy. Technical topics discussed include cybersecurity; encryption; privacy policy; trust; security and the Internet of Things; Botnets; data risks; cloudbased services; and visualization.

Blockchain for Cybersecurity and Privacy

Название: Blockchain for Cybersecurity and Privacy
ISBN: 036734310X ISBN-13(EAN): 9780367343101
Издательство: Taylor&Francis
Рейтинг:
Цена: 10717.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the Blockchain applications for cybersecurity and privacy. The purpose of this book is to improve the awareness of readers about Blockchain technology applications for cybersecurity and privacy.

Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2

Автор: Moallem Abbas
Название: Hci for Cybersecurity, Privacy and Trust: Second International Conference, Hci-CPT 2020, Held as Part of the 22nd Hci International Conference, Hcii 2
ISBN: 3030503089 ISBN-13(EAN): 9783030503086
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Human Factors in Cybersecurity.- Privacy and Trust.- Usable Security Approaches.

Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust

Автор: Khajuria Samant, Bonde Camilla, Skouby Knud Erik
Название: Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust
ISBN: 8793379420 ISBN-13(EAN): 9788793379428
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 8276.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Hci for Cybersecurity, Privacy and Trust: Third International Conference, Hci-CPT 2021, Held as Part of the 23rd Hci International Conference, Hcii 20

Автор: Moallem Abbas
Название: Hci for Cybersecurity, Privacy and Trust: Third International Conference, Hci-CPT 2021, Held as Part of the 23rd Hci International Conference, Hcii 20
ISBN: 3030773914 ISBN-13(EAN): 9783030773915
Издательство: Springer
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Usable Security.- Authentication Management of Home IoT Devices.- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?.- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks.- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review.- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes.- Risk Assessment of "Ostrich ZIP".- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users.- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services.- Security and Privacy by Design.- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience.- A Human Factor Approach to Threat Modeling.- Smart Technologies and Internet of Things Designed for Aging in Place.- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration.- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces.- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk.- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior.- Privacy Design Strategies and the GDPR: A Systematic Literature Review.- User Behavior Analysis in Cybersecurity.- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure.- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.- Perceptions of Security and Privacy in mHealth.- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.- CyberPin - Challenges on Recognizing Youngest Cyber Talents.- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness.- Understanding the Last Line of Defense: Human Response to Cybersecurity Events.- Security and Privacy Awareness.- The Effectiveness of Video Messaging Campaigns to Use 2FA.- A Study on Online Businesses' Commitment to Consumer Privacy.- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks.- Social Engineering Attacks: Recent Advances and Challenges.- Brand Validation: Security Indicator to Better Indicate Website Identity.- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials.- Gaming Apps' and Social Media Partnership: A Privacy Perspective.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия