Télécharger le livre :  Building a HIPAA-Compliant Cybersecurity Program
Ajouter à ma liste d'envies
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...

Editeur : Apress
Parution : 2017-11-11

PDF, ePub

62,11
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Ajouter à ma liste d'envies
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...

Editeur : Springer
Parution : 2017-10-30
Collection : Terrorism, Security, and Computation
PDF, ePub

179,34
Télécharger le livre :  Strategic Cyber Defense
Ajouter à ma liste d'envies
With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies...

Editeur : SAGE Publications Ltd
Parution : 2017-07-15

PDF

92,14
Télécharger le livre :  Das IT-Gesetz: Compliance in der IT-Sicherheit
Ajouter à ma liste d'envies
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie zum Schutz von Daten. Es ist damit wertvolles Hilfsmittel für...

Editeur : Springer Vieweg
Parution : 2017-07-10

PDF, ePub

66,05
Télécharger le livre :  Digital Privacy and Security Using Windows
Ajouter à ma liste d'envies
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...

Editeur : Apress
Parution : 2017-07-02

PDF, ePub

66,05
Télécharger le livre :  50 Jahre Universitäts-Informatik in München
Ajouter à ma liste d'envies
50 Jahre Lehre in Informatik an den drei Münchner Universitäten (Ludwig-Maximilians-Universität, Technische Universität München und Universität der Bundeswehr Neubiberg) sind der Anlass für diese Sammlung aktueller Informatik-Aktivitäten in Forschung und Lehre im Jahr...

Editeur : Springer Vieweg
Parution : 2017-06-29

PDF, ePub

62,11
Télécharger le livre :  Datensicherheit
Ajouter à ma liste d'envies
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein...

Editeur : Springer Vieweg
Parution : 2017-06-13

PDF, ePub

24,64
Télécharger le livre :  Advances in Human Factors in Cybersecurity
Ajouter à ma liste d'envies
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Editeur : Springer
Parution : 2017-06-13
Collection : Advances in Intelligent Systems and Computing
PDF, ePub

147,69
Télécharger le livre :  Cyberspace
Ajouter à ma liste d'envies
This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....

Editeur : Springer
Parution : 2017-05-11
Collection : Advanced Sciences and Technologies for Security Applications
PDF, ePub

89,66
Télécharger le livre :  IT-Risikomanagement mit System
Ajouter à ma liste d'envies
Das Buch bietet einen praxisbezogenen Leitfaden für das Informationssicherheits-, IT- und Cyber-Risikomanagement im Unternehmen – es ist branchenneutral und nimmt Bezug auf relevante Konzepte und Standards des Risikomanagements und der Governance (z.B. COBIT, NIST SP...

Editeur : Springer Vieweg
Parution : 2017-04-19
Collection : Edition
PDF, ePub

69,01
Télécharger le livre :  Advanced Penetration Testing
Ajouter à ma liste d'envies
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...

Editeur : Wiley
Parution : 2017-02-27

PDF, ePub

46,42
Télécharger le livre :  Personal Cybersecurity
Ajouter à ma liste d'envies
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs...

Editeur : Apress
Parution : 2017-01-12

PDF, ePub

52,24
Télécharger le livre :  Biometric Security and Privacy
Ajouter à ma liste d'envies
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as...

Editeur : Springer
Parution : 2016-12-21
Collection : Signal Processing for Security Technologies
PDF, ePub

158,24
Télécharger le livre :  NTP Security
Ajouter à ma liste d'envies
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network...

Editeur : Apress
Parution : 2016-12-10

PDF, ePub

34,50
Télécharger le livre :  Practical Information Security Management
Ajouter à ma liste d'envies
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works...

Editeur : Apress
Parution : 2016-11-29

PDF, ePub

78,87
Télécharger le livre :  Certified Ethical Hacker (CEH) Foundation Guide
Ajouter à ma liste d'envies
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...

Editeur : Apress
Parution : 2016-11-29

PDF, ePub

34,50
Télécharger le livre :  Fundamentals of Network Forensics
Ajouter à ma liste d'envies
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the...

Editeur : Springer
Parution : 2016-11-25
Collection : Computer Communications and Networks
PDF

105,49
Télécharger le livre :  Meeting Security Challenges through Data Analytics and Decision Support
Ajouter à ma liste d'envies
The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the...

Editeur : SAGE Publications Ltd
Parution : 2016-11-15

PDF

105,31
Télécharger le livre :  The Second Economy
Ajouter à ma liste d'envies
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment.In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and...

Editeur : Apress
Parution : 2016-10-20

PDF, ePub

39,43
Télécharger le livre :  IT-Sicherheitsmanagement nach der neuen ISO 27001
Ajouter à ma liste d'envies
Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das...

Editeur : Springer Vieweg
Parution : 2016-09-14
Collection : Edition
PDF, ePub

42,39
<< < 89101112 >