Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

The NICE Cyber Security Framework, Alsmadi


Варианты приобретения
Цена: 60550.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 201 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Alsmadi
Название:  The NICE Cyber Security Framework
ISBN: 9783031216503
Издательство: Springer
Классификация:


ISBN-10: 3031216504
Обложка/Формат: Hardback
Страницы: 455
Вес: 0.28 кг.
Дата издания: 30.03.2023
Язык: English
Издание: 2nd ed. 2023
Иллюстрации: 162 tables, color; 1 illustrations, black and white; xxii, 396 p. 1 illus.
Размер: 161 x 242 x 30
Читательская аудитория: Professional & vocational
Основная тема: Engineering
Подзаголовок: Cyber security intelligence and analytics
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework. This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment.
Дополнительное описание: Introduction.- Acquisition Management.- Continuity Planning and Disaster Recovery.- Cyber Defense Analysis and Support.- Cyber Intelligence.- Cyber Intelligence Analysis.- Cyber Operational Planning.- Cyber Policy and Strategy Management.- Cyber Threat An


The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 10560.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Darkweb Cyber Threat Intelligence Mining

Автор: Robertson
Название: Darkweb Cyber Threat Intelligence Mining
ISBN: 1107185777 ISBN-13(EAN): 9781107185777
Издательство: Cambridge Academ
Рейтинг:
Цена: 65470.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book examines cyber threat intelligence obtained from the center of the malicious hacking underworld - the dark web. It studies these communities both qualitatively and quantitatively, leveraging techniques from data mining, machine learning and AI, and offering insights to both cybersecurity practitioners and researchers.

Cyber warfare

Название: Cyber warfare
ISBN: 3319140388 ISBN-13(EAN): 9783319140384
Издательство: Springer
Рейтинг:
Цена: 88500.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

Cyber Security: Analytics, Technology and Automation

Автор: Martti Lehto; Pekka Neittaanm?ki
Название: Cyber Security: Analytics, Technology and Automation
ISBN: 331918301X ISBN-13(EAN): 9783319183015
Издательство: Springer
Рейтинг:
Цена: 111790.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time.

The Nice Cyber Security Framework: Cyber Security Management

Автор: Alsmadi Izzat, Easttom Chuck, Tawalbeh Lo`ai
Название: The Nice Cyber Security Framework: Cyber Security Management
ISBN: 303041986X ISBN-13(EAN): 9783030419868
Издательство: Springer
Рейтинг:
Цена: 55890.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook covers security controls and management. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills.

The Nice Cyber Security Framework: Cyber Security Management

Автор: Alsmadi Izzat, Easttom Chuck, Tawalbeh Lo`ai
Название: The Nice Cyber Security Framework: Cyber Security Management
ISBN: 3030419894 ISBN-13(EAN): 9783030419899
Издательство: Springer
Цена: 55890.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook covers security controls and management. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills.

The NICE Cyber Security Framework

Автор: Izzat Alsmadi
Название: The NICE Cyber Security Framework
ISBN: 3030023591 ISBN-13(EAN): 9783030023591
Издательство: Springer
Рейтинг:
Цена: 79190.00 T
Наличие на складе: Невозможна поставка.
Описание: This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.

Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more

Information security governance

Автор: Volchkov, Andrej
Название: Information security governance
ISBN: 0815356447 ISBN-13(EAN): 9780815356448
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework

Автор: Gorge Mathieu
Название: The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework
ISBN: 1950863417 ISBN-13(EAN): 9781950863419
Издательство: Неизвестно
Цена: 27580.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: We've all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit--until a data breach threatens the bottom line anyway.

In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company's data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization's cyber risk and the steps they need to take to protect their information. There's a cyber-elephant in the boardroom and it needs to be addressed

Assessing information security

Автор: Vladimirov, Andrew Gavrilenko, Konstantin Michajlowski, Andrei
Название: Assessing information security
ISBN: 1849285993 ISBN-13(EAN): 9781849285995
Издательство: Неизвестно
Рейтинг:
Цена: 73550.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. This book offers guidance on information security, underpinned by a profound understanding of human conflict. It covers the developments in the threat landscape and advice available in the version of ISO27001:2013.

Practical Security Properties on Commodity Computing Platforms

Автор: Amit Vasudevan
Название: Practical Security Properties on Commodity Computing Platforms
ISBN: 3030250482 ISBN-13(EAN): 9783030250485
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation.
uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called 'uberapps'). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation.
The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues.
The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.

Insider Computer Fraud

Автор: Brancik, Kenneth
Название: Insider Computer Fraud
ISBN: 0367388065 ISBN-13(EAN): 9780367388065
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.

Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes.

Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.



Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия