Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Securing Systems: Applied Security Architecture and Threat Models, Schoenfield Brook S. E.


Варианты приобретения
Цена: 7195.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Schoenfield Brook S. E.
Название:  Securing Systems: Applied Security Architecture and Threat Models
ISBN: 9781032027401
Издательство: Taylor&Francis
Классификация:





ISBN-10: 1032027401
Обложка/Формат: Paperback
Страницы: 440
Вес: 0.86 кг.
Дата издания: 30.06.2021
Язык: English
Иллюстрации: 11 tables, black and white; 50 illustrations, black and white
Размер: 25.15 x 17.53 x 2.54 cm
Читательская аудитория: Tertiary education (us: college)
Подзаголовок: Applied security architecture and threat models
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание: This set of previously out-of-print books collects together valuable research. Areas covered include the air war, land battles, generalship, dictatorship and appeasement, the use of atomic weapons, propaganda, conscription and conscientious objection, civilian evacuation, refugees, resistance under occupation, and much more besides.


Securing an IT Organization through Governance, Risk Management, and Audit

Автор: Sigler
Название: Securing an IT Organization through Governance, Risk Management, and Audit
ISBN: 1498737315 ISBN-13(EAN): 9781498737319
Издательство: Taylor&Francis
Рейтинг:
Цена: 11023.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.

Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.

The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.

Securing Systems

Автор: Schoenfield
Название: Securing Systems
ISBN: 1482233975 ISBN-13(EAN): 9781482233971
Издательство: Taylor&Francis
Рейтинг:
Цена: 19140.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.

Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis:

  • When should the security architect begin the analysis?
  • At what points can a security architect add the most value?
  • What are the activities the architect must execute?
  • How are these activities delivered?
  • What is the set of knowledge domains applied to the analysis?
  • What are the outputs?
  • What are the tips and tricks that make security architecture risk assessment easier?

To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Securing the Cloud

Автор: Franklin Jr., Curtis
Название: Securing the Cloud
ISBN: 1032475714 ISBN-13(EAN): 9781032475714
Издательство: Taylor&Francis
Рейтинг:
Цена: 6889.00 р.
Наличие на складе: Поставка под заказ.

Research Anthology on Privatizing and Securing Data

Название: Research Anthology on Privatizing and Securing Data
ISBN: 1799889548 ISBN-13(EAN): 9781799889540
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 269716.00 р.
Наличие на складе: Нет в наличии.

Описание: With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled.

New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated.

The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more.

This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.

Blockchain and Clinical Trial

Автор: Hamid Jahankhani; Stefan Kendzierskyj; Arshad Jama
Название: Blockchain and Clinical Trial
ISBN: 3030112888 ISBN-13(EAN): 9783030112882
Издательство: Springer
Рейтинг:
Цена: 16769.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials.Lack of data transparency is an underlying theme within the clinical research world and causes issues of corruption, fraud, errors and a problem of reproducibility. Blockchain can prove to be a method to ensure a much more joined up and integrated approach to data sharing and improving patient outcomes. Surveys undertaken by creditable organisations in the healthcare industry are analysed in this book that show strong support for using blockchain technology regarding strengthening data security, interoperability and a range of beneficial use cases where mostly all respondents of the surveys believe blockchain will be important for the future of the healthcare industry. Another aspect considered in the book is the coming surge of healthcare wearables using Internet of Things (IoT) and the prediction that the current capacity of centralised networks will not cope with the demands of data storage. The benefits are great for clinical research, but will add more pressure to the transparency of clinical trials and how this is managed unless a secure mechanism like, blockchain is used.

Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management

Автор: Bourlai Thirimachos, Karampelas Panagiotis, Patel Vishal M.
Название: Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management
ISBN: 3030394883 ISBN-13(EAN): 9783030394882
Издательство: Springer
Цена: 13974.00 р.
Наличие на складе: Поставка под заказ.

Описание: The book presents novel research in the areas of social identity and security when using mobile platforms.

Enterprise level security

Автор: Simpson, William R.
Название: Enterprise level security
ISBN: 0367658518 ISBN-13(EAN): 9780367658519
Издательство: Taylor&Francis
Рейтинг:
Цена: 6889.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements

Testing and Securing Web Applications

Автор: Das, Ravi
Название: Testing and Securing Web Applications
ISBN: 0367333759 ISBN-13(EAN): 9780367333751
Издательство: Taylor&Francis
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not fall into the hands of a malicious third party. The only way that this can be accomplished is with thorough security testing.

Applied Approach to Privacy and Security for the Internet of Things

Автор: Parag Chatterjee, Emmanuel Benoist, Asoke Nath
Название: Applied Approach to Privacy and Security for the Internet of Things
ISBN: 1799824454 ISBN-13(EAN): 9781799824459
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 24255.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities.

Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Managing risk and security in outsourcing it services

Автор: Siepmann, Frank (1 Security Solutions Applied, Llc, Leesburg, Virginia, Usa)
Название: Managing risk and security in outsourcing it services
ISBN: 0367379082 ISBN-13(EAN): 9780367379087
Издательство: Taylor&Francis
Рейтинг:
Цена: 9033.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.

Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation-whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.

Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.

By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

State of the Art in Applied Cryptography

Автор: Bart Preneel; Vincent Rijmen
Название: State of the Art in Applied Cryptography
ISBN: 3540654747 ISBN-13(EAN): 9783540654742
Издательство: Springer
Рейтинг:
Цена: 12157.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event.

The Insider Threat

Автор: Thompson
Название: The Insider Threat
ISBN: 1498747086 ISBN-13(EAN): 9781498747080
Издательство: Taylor&Francis
Рейтинг:
Цена: 10411.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. The book guides readers to a greater depth of understanding and action-oriented options.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия