Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Information Security: Cyberattacks, Data Breaches and Security Controls, Paul Scholz


Варианты приобретения
Цена: 215410.00T
Кол-во:
Наличие:
Добавить в корзину
в Мои желания

Автор: Paul Scholz
Название:  Information Security: Cyberattacks, Data Breaches and Security Controls
ISBN: 9781536158809
Издательство: Nova Science
Классификация:
ISBN-10: 1536158801
Обложка/Формат: Hardback
Страницы: 325
Вес: 0.57 кг.
Дата издания: 30.07.2019
Серия: Computing & IT
Язык: English
Ключевые слова: Computer security
Подзаголовок: Cyberattacks, data breaches and security controls
Рейтинг:
Поставляется из: Англии
Описание: Federal agencies and our nations critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1. The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nations tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRSs fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2. Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems. The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPMs information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agencys security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPMs actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations. CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agencys systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies implementation of the governments approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions. Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.

Автор: Weisbord Noah
Название: The Crime of Aggression: The Quest for Justice in an Age of Drones, Cyberattacks, Insurgents, and Autocrats
ISBN: 069116987X ISBN-13(EAN): 9780691169873
Издательство: Wiley
Рейтинг:
Цена: 36960.00 T
Наличие на складе: Поставка под заказ.
Описание:

A gripping behind-the-scenes account of the dramatic legal fight to hold leaders personally responsible for aggressive war

On July 17, 2018, starting an unjust war became a prosecutable international crime alongside genocide, crimes against humanity, and war crimes. Instead of collective state responsibility, our leaders are now personally subject to indictment for crimes of aggression, from invasions and preemptions to drone strikes and cyberattacks. The Crime of Aggression is Noah Weisbord's riveting insider's account of the high-stakes legal fight to enact this historic legislation and hold politicians accountable for the wars they start.

Weisbord, a key drafter of the law for the International Criminal Court, takes readers behind the scenes of one of the most consequential legal dramas in modern international diplomacy. Drawing on in-depth interviews and his own invaluable insights, he sheds critical light on the motivations of the prosecutors, diplomats, and military strategists who championed the fledgling prohibition on unjust war--and those who tried to sink it. He untangles the complex history behind the measure, tracing how the crime of aggression was born at the Nuremberg trials only to fall dormant during the Cold War, and he draws lessons from such pivotal events as the collapse of the League of Nations, the rise of the United Nations, September 11, and the war on terror.

The power to try leaders for unjust war holds untold promise for the international order, but also great risk. In this incisive and vitally important book, Weisbord explains how judges in such cases can balance the imperatives of justice and peace, and how the fair prosecution of aggression can humanize modern statecraft.


Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks

Автор: Mandel Robert
Название: Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks
ISBN: 1626164126 ISBN-13(EAN): 9781626164123
Издательство: Неизвестно
Цена: 160850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. This book offers a strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors.

Unsecurity: Information Security Is Failing. Breaches Are Epidemic. How Can We Fix This Broken Industry?

Автор: Francen Evan
Название: Unsecurity: Information Security Is Failing. Breaches Are Epidemic. How Can We Fix This Broken Industry?
ISBN: 164343974X ISBN-13(EAN): 9781643439747
Издательство: Неизвестно
Цена: 16510.00 T
Наличие на складе: Невозможна поставка.

Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events

Автор: Thompson Eric C.
Название: Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
ISBN: 1484256077 ISBN-13(EAN): 9781484256077
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Beginning-Intermediate user level

Combating Security Breaches and Criminal Activity in the Digital Sphere

Автор: S. Geetha, Asnath Victy Phamila
Название: Combating Security Breaches and Criminal Activity in the Digital Sphere
ISBN: 1522501932 ISBN-13(EAN): 9781522501930
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 199590.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Provides the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. It features law enforcement perspectives, theoretical foundations, and forensic methods.

Security Breaches A Complete Guide - 2019 Edition

Автор: Blokdyk Gerardus
Название: Security Breaches A Complete Guide - 2019 Edition
ISBN: 0655828664 ISBN-13(EAN): 9780655828662
Издательство: Неизвестно
Рейтинг:
Цена: 122770.00 T
Наличие на складе: Невозможна поставка.
Описание:

Who should be accountable for security breaches or misuse of customer data? Is an effective incident response team in place and equipped to reduce the occurrence, proliferation and impact of security breaches? Why should general managers care about IT security breaches? How do your data brokers verify that customers have legitimate need for the information some purchase, and how will this verification process change in response to recent data-security breaches? Do you consider the impact security breaches have on business?

This powerful Security Breaches self-assessment will make you the credible Security Breaches domain expert by revealing just what you need to know to be fluent and ready for any Security Breaches challenge.

How do I reduce the effort in the Security Breaches work to be done to get problems solved? How can I ensure that plans of action include every Security Breaches task and that every Security Breaches outcome is in place? How will I save time investigating strategic and tactical options and ensuring Security Breaches costs are low? How can I deliver tailored Security Breaches advice instantly with structured going-forward plans?

There's no better guide through these mind-expanding questions than acclaimed best-selling author Gerard Blokdyk. Blokdyk ensures all Security Breaches essentials are covered, from every angle: the Security Breaches self-assessment shows succinctly and clearly that what needs to be clarified to organize the required activities and processes so that Security Breaches outcomes are achieved.

Contains extensive criteria grounded in past and current successful projects and activities by experienced Security Breaches practitioners. Their mastery, combined with the easy elegance of the self-assessment, provides its superior value to you in knowing how to ensure the outcome of any efforts in Security Breaches are maximized with professional results.

Your purchase includes access details to the Security Breaches self-assessment dashboard download which gives you your dynamically prioritized projects-ready tool and shows you exactly what to do next. Your exclusive instant access details can be found in your book. You will receive the following contents with New and Updated specific criteria:

- The latest quick edition of the book in PDF

- The latest complete edition of the book in PDF, which criteria correspond to the criteria in...

- The Self-Assessment Excel Dashboard

- Example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation

- In-depth and specific Security Breaches Checklists

- Project management checklists and templates to assist with implementation

INCLUDES LIFETIME SELF ASSESSMENT UPDATES

Every self assessment comes with Lifetime Updates and Lifetime Free Updated Books. Lifetime Updates is an industry-first feature which allows you to receive verified self assessment updates, ensuring you always have the most accurate information at your fingertips.


Security Breaches and Threat Prevention in the Internet of Things

Автор: Jeyanthi N., Thandeeswaran R.
Название: Security Breaches and Threat Prevention in the Internet of Things
ISBN: 1522522964 ISBN-13(EAN): 9781522522966
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 174630.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Data Security Breaches and Privacy in Europe

Автор: Rebecca Wong
Название: Data Security Breaches and Privacy in Europe
ISBN: 1447155858 ISBN-13(EAN): 9781447155850
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered.

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Автор: Michelle Moore
Название: Cybersecurity Breaches and Issues Surrounding Online Threat Protection
ISBN: 1522519416 ISBN-13(EAN): 9781522519416
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents the latest scholarly research on the various types of unauthorized access or damage to electronic data. This publication features extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, and is designed for academics, researchers, computer engineers, graduate students, and practitioners.

Telehealth Security: An Examination of Variance in Telehealth Security Breaches

Автор: Dr. Seria D. Lakes DSc
Название: Telehealth Security: An Examination of Variance in Telehealth Security Breaches
ISBN: 0692291865 ISBN-13(EAN): 9780692291863
Издательство: Неизвестно
Цена: 20680.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy

Автор: Sloan Robert, Warner Richard
Название: Why Don`t We Defend Better?: Data Breaches, Risk Management, and Public Policy
ISBN: 0367787911 ISBN-13(EAN): 9780367787912
Издательство: Taylor&Francis
Рейтинг:
Цена: 22450.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The wave of data breaches raises two pressing questions: Why don`t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.

Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet

Автор: Snowden John
Название: Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet
ISBN: 1801147396 ISBN-13(EAN): 9781801147392
Издательство: Неизвестно
Рейтинг:
Цена: 23820.00 T
Наличие на складе: Нет в наличии.
Описание:

Do you know what is hacking? Do you want to learn about cyber security? Are you unaware of mistakes made in cybersecutity?

This book is for you This book teaches cyber security, how to defend themselves and defend against cyber-attacks. This book covers the latest security threats and defense strategies. Cyber security starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain.

This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.

What you will learn

  • The importance of hacking.
  • Use cyber security kill chain to understand the attack strategy
  • Common cyber attacks
  • Benefits of cyber security.
  • Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy
  • Identify different types of cyber-attacks, such as SQL injection, malware and social engineering threats such as phishing emails
  • Weigh the pros and cons of popular cybersecurity strategies of the past two decades
  • Implement and then measure the outcome of a cybersecurity strategy
  • Get an in-depth understanding of the security and hacking.
  • Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud
  • Learn demand of cyber security.

This open access book provides an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those problems.

Who this book is for 

For the IT professional venturing into the IT security domain, IT pen testers, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

WHAT ARE YOU WAITING FOR ORDER YOUR COPY NOW......



Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия