Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Managing an Information Security and Privacy Awareness and Training Program, Herold, Rebecca


Варианты приобретения
Цена: 137810.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 171 шт.  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Herold, Rebecca
Название:  Managing an Information Security and Privacy Awareness and Training Program
ISBN: 9781439815458
Издательство: Taylor&Francis
Классификация:




ISBN-10: 1439815453
Обложка/Формат: Hardback
Страницы: 568
Вес: 0.97 кг.
Дата издания: 24.08.2010
Язык: English
Издание: 2 ed
Иллюстрации: 38 illustrations, black and white
Размер: 241 x 156 x 33
Читательская аудитория: Postgraduate, research & scholarly
Рейтинг:
Поставляется из: Европейский союз

Information Security and Privacy

Автор: Susilo
Название: Information Security and Privacy
ISBN: 3319936379 ISBN-13(EAN): 9783319936376
Издательство: Springer
Рейтинг:
Цена: 91300.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 123910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Enterprise level security 2

Автор: Foltz, Kevin E. Simpson, William R.
Название: Enterprise level security 2
ISBN: 0367531739 ISBN-13(EAN): 9780367531737
Издательство: Taylor&Francis
Рейтинг:
Цена: 80630.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors` first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.

Data and Applications Security and Privacy XXXII

Автор: Kerschbaum
Название: Data and Applications Security and Privacy XXXII
ISBN: 3319957287 ISBN-13(EAN): 9783319957289
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions.

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

Автор: Alfreda Dudley, James Braman, Giovanni Vincenti
Название: Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
ISBN: 1613501323 ISBN-13(EAN): 9781613501320
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.

Blockchain for information security and privacy

Название: Blockchain for information security and privacy
ISBN: 0367654482 ISBN-13(EAN): 9780367654481
Издательство: Taylor&Francis
Рейтинг:
Цена: 102070.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book presents an integrated view of blockchain for systems security and privacy. It identifies issues of utilizing blockchain in applications including smart contracts, healthcare, and finance. It then explains security and privacy techniques including representative consensus algorithms, hash chained storage, and mixing protocols.

ICT Systems Security and Privacy Protection

Автор: Sabrina De Capitani di Vimercati; Fabio Martinelli
Название: ICT Systems Security and Privacy Protection
ISBN: 3319864149 ISBN-13(EAN): 9783319864143
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions.

The Complete Guide to Cybersecurity Risks and Controls

Автор: Kohnke
Название: The Complete Guide to Cybersecurity Risks and Controls
ISBN: 1498740545 ISBN-13(EAN): 9781498740548
Издательство: Taylor&Francis
Рейтинг:
Цена: 122490.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations.

The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.

The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.


Information security governance

Автор: Volchkov, Andrej
Название: Information security governance
ISBN: 0815356447 ISBN-13(EAN): 9780815356448
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Creating an Information Security Program from Scratch

Автор: Williams Walter
Название: Creating an Information Security Program from Scratch
ISBN: 036755464X ISBN-13(EAN): 9780367554644
Издательство: Taylor&Francis
Рейтинг:
Цена: 137810.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book is written for the first security hire in an organization; either an individual moving into this role from within the organization or hired into the role.

Managing Trust in Cyberspace

Автор: Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
Название: Managing Trust in Cyberspace
ISBN: 1138374776 ISBN-13(EAN): 9781138374775
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop.

Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection.

Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.


Managing security services in heterogenous networks

Автор: Jeyanthi, N Ma, Kun Perumal, Thinagaran Thandeeswaran, N.
Название: Managing security services in heterogenous networks
ISBN: 0367457342 ISBN-13(EAN): 9780367457341
Издательство: Taylor&Francis
Рейтинг:
Цена: 67360.00 T
Наличие на складе: Нет в наличии.
Описание: This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks, wireless networks, mobile ad hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия