Assessing Information Security

Assessing Information Security

Assessing Information Security

Andrei Michajlowski / Andrew Vladimirov / Konstantin Gavrilenko

61,92 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2015
Materia
Privacidad y protección de datos
ISBN:
9781849285995
61,92 €
IVA incluido
Disponible
Añadir a favoritos

The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cyber security that goes beyond technology - all staff in the organisation have a role to play and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that explain what to do when under attack. With this in mind, the authors of this book have drawn on the work of Clausewitz and Sun Tzu and applied it to the understanding of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict. Building on the success of the first edition, this new edition covers the most recent developments in the threat landscape and the best practice advice available in the latest version of ISO27001:2013.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Cybercrime
    Denise M. Chatam / Denise MChatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. ...
    Disponible

    14,40 €

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...