Автор: Kevin D. Mitnick Название: The Art of Deception: Controlling the Human Element of Security ISBN: 076454280X ISBN-13(EAN): 9780764542800 Издательство: Wiley Рейтинг: Цена: 10560.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Автор: Robertson Название: Darkweb Cyber Threat Intelligence Mining ISBN: 1107185777 ISBN-13(EAN): 9781107185777 Издательство: Cambridge Academ Рейтинг: Цена: 65470.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book examines cyber threat intelligence obtained from the center of the malicious hacking underworld - the dark web. It studies these communities both qualitatively and quantitatively, leveraging techniques from data mining, machine learning and AI, and offering insights to both cybersecurity practitioners and researchers.
Название: Cyber warfare ISBN: 3319140388 ISBN-13(EAN): 9783319140384 Издательство: Springer Рейтинг: Цена: 88500.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.
Автор: Martti Lehto; Pekka Neittaanm?ki Название: Cyber Security: Analytics, Technology and Automation ISBN: 331918301X ISBN-13(EAN): 9783319183015 Издательство: Springer Рейтинг: Цена: 111790.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time.
Автор: Alsmadi Izzat, Easttom Chuck, Tawalbeh Lo`ai Название: The Nice Cyber Security Framework: Cyber Security Management ISBN: 303041986X ISBN-13(EAN): 9783030419868 Издательство: Springer Рейтинг: Цена: 55890.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This textbook covers security controls and management. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills.
Автор: Alsmadi Izzat, Easttom Chuck, Tawalbeh Lo`ai Название: The Nice Cyber Security Framework: Cyber Security Management ISBN: 3030419894 ISBN-13(EAN): 9783030419899 Издательство: Springer Цена: 55890.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This textbook covers security controls and management. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills.
Автор: Izzat Alsmadi Название: The NICE Cyber Security Framework ISBN: 3030023591 ISBN-13(EAN): 9783030023591 Издательство: Springer Рейтинг: Цена: 79190.00 T Наличие на складе: Невозможна поставка. Описание: This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
Автор: Volchkov, Andrej Название: Information security governance ISBN: 0815356447 ISBN-13(EAN): 9780815356448 Издательство: Taylor&Francis Рейтинг: Цена: 60220.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.
Автор: Gorge Mathieu Название: The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework ISBN: 1950863417 ISBN-13(EAN): 9781950863419 Издательство: Неизвестно Цена: 27580.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: We've all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit--until a data breach threatens the bottom line anyway. In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company's data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization's cyber risk and the steps they need to take to protect their information. There's a cyber-elephant in the boardroom and it needs to be addressed
Автор: Vladimirov, Andrew Gavrilenko, Konstantin Michajlowski, Andrei Название: Assessing information security ISBN: 1849285993 ISBN-13(EAN): 9781849285995 Издательство: Неизвестно Рейтинг: Цена: 73550.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. This book offers guidance on information security, underpinned by a profound understanding of human conflict. It covers the developments in the threat landscape and advice available in the version of ISO27001:2013.
Автор: Amit Vasudevan Название: Practical Security Properties on Commodity Computing Platforms ISBN: 3030250482 ISBN-13(EAN): 9783030250485 Издательство: Springer Рейтинг: Цена: 46570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation.
uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called 'uberapps'). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation.
The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues.
The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.
Автор: Brancik, Kenneth Название: Insider Computer Fraud ISBN: 0367388065 ISBN-13(EAN): 9780367388065 Издательство: Taylor&Francis Рейтинг: Цена: 60220.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.
Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes.
Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz