Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Cybersecurity Risk Management: Mastering the Fundamentals Using the Nist Cybersecurity Framework, Brumfield Cynthia


Варианты приобретения
Цена: 92870.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: 5 шт.  Склад Америка: 205 шт.  
При оформлении заказа до: 2025-12-22
Ориентировочная дата поставки: Январь

Добавить в корзину
в Мои желания

Автор: Brumfield Cynthia
Название:  Cybersecurity Risk Management: Mastering the Fundamentals Using the Nist Cybersecurity Framework
ISBN: 9781119816287
Издательство: Wiley
Классификация:

ISBN-10: 1119816289
Обложка/Формат: Hardcover
Страницы: 224
Вес: 0.48 кг.
Дата издания: 09.12.2021
Язык: English
Размер: 25.65 x 17.53 x 1.52 cm
Читательская аудитория: Professional & vocational
Подзаголовок: Mastering the fundamentals using the nist cybersecurity framework
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: Cybersecurity Risk Management

In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.

With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices.

Filled with clear and easy-to-follow advice, this book also offers readers:

  • A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities
  • A valuable exploration of modern tools that can improve an organizations network infrastructure protection
  • A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring
  • A helpful examination of the recovery from cybersecurity incidents

Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.


Automotive cybersecurity issues and vulnerabilities /

Автор: Craig Gibbs
Название: Automotive cybersecurity issues and vulnerabilities /
ISBN: 1634859871 ISBN-13(EAN): 9781634859875
Издательство: Nova Science
Рейтинг:
Цена: 96090.00 T
Наличие на складе: Невозможна поставка.
Описание: Modern vehicles contain multiple interfaces -- connections between the vehicle and external networks -- that leave vehicle systems, including safety-critical systems, such as braking and steering, vulnerable to cyberattacks. Researchers have shown that these interfaces -- if not properly secured -- can be exploited through direct, physical access to a vehicle, as well as remotely through short-range and long-range wireless channels. This book addresses, among other things, available information about the key cybersecurity vulnerabilities in modern vehicles that could impact passenger safety; key practices and technologies, if any, available to mitigate vehicle cybersecurity vulnerabilities and the impacts of potential attacks; views of selected stakeholders on challenges they face related to vehicle cybersecurity and industry-led efforts to address vehicle cybersecurity; and Department of Transportations (DOT) efforts to address vehicle cybersecurity.

Cybersecurity for Information Professionals

Автор: Chang, Hsia-Ching , Hawamdeh, Suliman
Название: Cybersecurity for Information Professionals
ISBN: 0367486814 ISBN-13(EAN): 9780367486815
Издательство: Taylor&Francis
Рейтинг:
Цена: 51440.00 T
Наличие на складе: Есть
Описание: The book is an introduction to essential concepts of cybersecurity and information security and the methods and techniques used to combat cybersecurity threats and vulnerabilities. It covers broad areas related to cybersecurity and information security issues such as cybersecurity infrastructure, technologies, research, and product development.

A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It

Автор: Parenty Thomas, Domet Jack
Название: A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It
ISBN: 1633697991 ISBN-13(EAN): 9781633697997
Издательство: NBN International
Рейтинг:
Цена: 35200.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.

Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide.

Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility.

In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes:

  • Understanding cyber risks and how best to control them
  • Planning and preparing for a crisis--and leading in its aftermath
  • Making cybersecurity a companywide initiative and responsibility
  • Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures
  • Aligning the board, executive leadership, and cybersecurity teams on priorities

Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.


Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture

Автор: Handa Anand, Negi Rohit, Shukla Sandeep
Название: Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture
ISBN: 8770224234 ISBN-13(EAN): 9788770224239
Издательство: Taylor&Francis
Рейтинг:
Цена: 99010.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. This book has 8 chapters describing these projects in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.


Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft

Автор: Bailey Sean M., Devin Kropp
Название: Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft
ISBN: 0997729007 ISBN-13(EAN): 9780997729009
Издательство: Неизвестно
Цена: 18350.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Everyone is besieged by a nonstop cyber-crime wave that victimizes millions of people and businesses each year. And trouble usually starts with a click.

In just the next 24 hours:

  • Scammers will target the public with 94 billion emails
  • Hackers will seize and hold 88,000 computers for ransom
  • Identity thieves will impersonate 35,000 people

How we handle our online security is critical to protecting our personal and professional lives. But guidance for staying safe has been fragmented and confusing--until now.

Hack-Proof Your Life Now demystifies the topic and introduces you to the New Cybersecurity Rules--clear, sensible, and do-able actions that will quickly improve your security.

Can anyone really be safe and secure online? Yes, there is a way to quickly shut down hackers, thieves, and identity scammers and enjoy good online security, say authors Sean M. Bailey and Devin Kropp. They contend that anyone can dramatically boost their online security by taking a handful of inexpensive and easy-to-accomplish actions.

Their book begins by asking the reader to measure his or her online security with a 10-question cybersecurity quiz. Nearly everyone scores poorly. But that changes quickly as the authors introduce the New Cybersecurity Rules, a set of 15 principles organized around three mindsets that must be cultivated in order to achieve higher security:

Secrecy. Email addresses, passwords, credit files, Social Security numbers, and other personal information need greater levels of protection. Governments and private companies have done a miserable job guarding personal data. Only individual actions can limit exposure to hackers' data breaches. The authors offer eight secrecy-boosting rules, including this one: Stop using a personal email address for online banking and credit accounts. It's too easily stolen. Instead, create a financial-only email account to use exclusively for finances. That limits exposure to just a few secure places on the Internet where the financial-only email resides, making it harder for hackers to scoop up and exploit.

Omniscience. Just like the financial services industry, consumers must use technology to become "financially all-knowing" and monitor--in real time-- personal banking and credit matters. By placing one's self at the center of online security (a key theme of the book), everyone can rest assured that identity thieves aren't quietly stealing their money or ruining their credit. One recommended omniscience rule: Set up notifications on banking and credit cards to instantly become aware whenever cash leaves any accounts or when credit is charged. It's a way to instantly spot fraud or identity theft, a solid protection to have at no extra cost.

Mindfulness. Enacting the New Cybersecurity Rules instills a stronger security mindset, the authors tell us. But how can it be maintained? Safety degrades without permanent changes to computer behaviors and security awareness. But the hackers never sleep. Even the best protected inbox will still receive a few dangerous emails. What to do? The authors suggest their 10-Second EMAIL Rule, an easy to remember mnemonic for staying mindful of avoiding malicious links. EMAIL stands for "Examine Message and Inspect Links" and shows how to spot and unmask dangerous blackmail spam and identity theft malware. It's a Zen-like practice that can benefit everyone every time they check their email.


Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801541086 ISBN-13(EAN): 9781801541084
Издательство: Неизвестно
Рейтинг:
Цена: 22060.00 T
Наличие на складе: Нет в наличии.
Описание: Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices



The Fundamentals of Computer Security for Beginners: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and

Автор: McKinnon Guy
Название: The Fundamentals of Computer Security for Beginners: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and
ISBN: 1914157052 ISBN-13(EAN): 9781914157059
Издательство: Неизвестно
Рейтинг:
Цена: 21140.00 T
Наличие на складе: Нет в наличии.
Описание:

Safety, from the Latin sine cura ("without concern"), is the condition that makes and makes one feel free from danger, or that gives the possibility to prevent, eliminate or make less serious damage, risks, difficulties, unpleasant events and the like.


Companies, most of the time, underestimate the security aspect, when it would be enough just a little common sense to devote a small amount of time to staff training to make everyone understand the main issues that concern them; it is necessary to create security policies that are not too complicated for users and to accustom the "distracted" user to have more attention in daily activities.


Working in the world of Information Security requires constant updating and daily study. The available technologies are increasing and becoming more and more complex and for this reason the need to secure data and information also increases.


Nowadays you do not realize how easily data is accessible on the network and how easy it is to find important information simply by browsing.

Hackers' objectives range from searching for system vulnerabilities to finding a person's vulnerability. It is important that everyone is informed about the concept of security in order to be more aware of the risks they are facing.


"There is no system that guarantees a maximum level of security."


Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801540985 ISBN-13(EAN): 9781801540988
Издательство: Неизвестно
Рейтинг:
Цена: 31260.00 T
Наличие на складе: Нет в наличии.
Описание: Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices



Fundamentals of Information Systems Security with Cybersecurity Cloud Labs: Print Bundle [With Access Code]

Автор: Kim David, Solomon Michael G.
Название: Fundamentals of Information Systems Security with Cybersecurity Cloud Labs: Print Bundle [With Access Code]
ISBN: 128415971X ISBN-13(EAN): 9781284159714
Издательство: Jones & Bartlett
Цена: 200590.00 T
Наличие на складе: Нет в наличии.

Cybersecurity Fundamentals

Автор: Thakur, Kutub , Pathan, Al-Sakib Khan
Название: Cybersecurity Fundamentals
ISBN: 0367472503 ISBN-13(EAN): 9780367472504
Издательство: Taylor&Francis
Рейтинг:
Цена: 74510.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied.

Cybersecurity Fundamentals

Автор: Thakur, Kutub , Pathan, Al-Sakib Khan
Название: Cybersecurity Fundamentals
ISBN: 0367476487 ISBN-13(EAN): 9780367476489
Издательство: Taylor&Francis
Рейтинг:
Цена: 204160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied.

Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801828563 ISBN-13(EAN): 9781801828567
Издательство: Неизвестно
Рейтинг:
Цена: 31260.00 T
Наличие на складе: Нет в наличии.
Описание:
55 % discount for bookstores Now At $33.99 instead of $ 52.68 $



Your customers will never stop reading this guide



Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Buy it Now and let your customers get addicted to this amazing book


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия