Автор: Stapleton, Jeff ; Epstein, W Clay Название: Security Without Obscurity: A Guide to PKI Operations ISBN: 1032545224 ISBN-13(EAN): 9781032545226 Издательство: Taylor&Francis Рейтинг: Цена: 122490.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Jan H.P. Eloff; Les Labuschagne; Rossouw von Solms Название: Information Security Management & Small Systems Security ISBN: 1475754833 ISBN-13(EAN): 9781475754834 Издательство: Springer Рейтинг: Цена: 139750.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields.
Автор: Wilding, Edward Название: Information Risk and Security ISBN: 1138380962 ISBN-13(EAN): 9781138380967 Издательство: Taylor&Francis Рейтинг: Цена: 51030.00 T Наличие на складе: Невозможна поставка. Описание: Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to prevent these threats before they happen and to investigate them, if and when they do. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computer and information systems.
Автор: Tibble, Ian Название: Security De-Engineering ISBN: 1439868344 ISBN-13(EAN): 9781439868348 Издательство: Taylor&Francis Рейтинг: Цена: 69410.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
Автор: Kohnke Название: Implementing Cybersecurity ISBN: 149878514X ISBN-13(EAN): 9781498785143 Издательство: Taylor&Francis Рейтинг: Цена: 122490.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
Автор: Ranise Название: Data and Applications Security and Privacy XXX ISBN: 3319414828 ISBN-13(EAN): 9783319414829 Издательство: Springer Рейтинг: Цена: 69880.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the refereed proceedings of the 30th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016.
Автор: Ray, Dewey E. Название: Data asset valuation ISBN: 1138297747 ISBN-13(EAN): 9781138297746 Издательство: Taylor&Francis Рейтинг: Цена: 83690.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Data has value, but our accounting methods do not give data a monetary value. This book presents a straight-forward, well-researched, practical solution to this problem by defining exactly what "data" is, explaining the role of data management in data asset valuations, and presenting an "open framework" - along with methods - for valuing data.
Автор: Editors: Shyamasundar, Rudrapatna K., Singh, Virendra, Vaidya Название: Information systems security ISBN: 3319725971 ISBN-13(EAN): 9783319725970 Издательство: Springer Цена: 46570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
Автор: Susilo Название: Information Security and Privacy ISBN: 3319936379 ISBN-13(EAN): 9783319936376 Издательство: Springer Рейтинг: Цена: 91300.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions.
Автор: Kerschbaum Название: Data and Applications Security and Privacy XXXII ISBN: 3319957287 ISBN-13(EAN): 9783319957289 Издательство: Springer Рейтинг: Цена: 46570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz