
ilość książek w kategorii: 5020
![]() |
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
|
cena:
59,03 |
![]() |
Under Pressure: Empowering Cyber Security Incident Responders
ISBN: 9798873918362 / Angielski / Miękka / 2024 / 222 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
59,92 |
![]() |
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
|
cena:
60,17 |
![]() |
Complete Guide to SEO for Beginners: A Beginner's Guide to Smart Online Visibility
ISBN: 9798345397695 / Angielski / Miękka / 2024 / 166 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,17 |
![]() |
Mastering Your Introduction to Cyber Security
ISBN: 9781634914185 / Angielski / Miękka / 2018 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,21 |
![]() |
Air Force Cyberspace Security and Control System (CSCS)
ISBN: 9781981808502 / Angielski / Miękka / 2017 / 206 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,29 |
![]() |
Capital of Spies
ISBN: 9798224714117 / Angielski / Miękka / 2024 / 110 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,38 |
![]() |
Code and Connect: Web Programming with PHP and MySQL
ISBN: 9798896107378 / Angielski / Miękka / 2024 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,43 |
![]() |
The CEO's Manual on Cyber Security
ISBN: 9780989253598 / Angielski / Miękka / 2013 / 244 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
|
cena:
60,49 |
![]() |
The Little Black Book of Computer Security, Second Edition
ISBN: 9781475286243 / Angielski / Miękka / 2012 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
|
cena:
60,49 |
![]() |
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
ISBN: 9780989253529 / Angielski / Miękka / 2014 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,49 |
![]() |
United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment
ISBN: 9781500750244 / Angielski / Miękka / 2014 / 140 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive review of recurring and stand-alone strategic cybersecurity strategy and policy documents and a detailed assessment of the United States cyber organization within the Department of Homeland Security, Department of Defense, and Department of Justice, the United States is indeed vulnerable to a cyber attack. Despite the recent emphasis on cyber attacks against private and governmental organizations, the genesis of American interest and awareness of...
Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive revi...
|
cena:
60,49 |
![]() |
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
ISBN: 9781502956453 / Angielski / Miękka / 2014 / 30 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated. This study explores a future - a "healthy cyber ecosystem" -...
This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U...
|
cena:
60,49 |
![]() |
Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring
ISBN: 9781500253370 / Angielski / Miękka / 2014 / 34 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,49 |
![]() |
When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia
ISBN: 9781500253608 / Angielski / Miękka / 2014 / 34 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,49 |
![]() |
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
ISBN: 9781514331361 / Angielski / Miękka / 2015 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings you a complete and up-to-date overview of the key issues related to the adoption and use of information technology, communications and healthcare, with detailed practical information to support students, professionals and other stakeholders in the field of healthcare. Health Informatics, an evolving specialization, strives to improve the quality and safety of patient care. This book addresses the concepts, tasks and skills that professionals...
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings...
|
cena:
60,49 |
![]() |
Handling Electronically Stored Information (ESI) in the Era of the Cloud
ISBN: 9781514804346 / Angielski / Miękka / 2015 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. More commonly known as emails, files, attachments, and documents, Electronically Stored Information (ESI) and the policy management around ESI has drastically changed over the past few years. Not only have laws and regulations taken on better definition on how ESI should be handled, but the proliferation of use of mobile devices and the integration of cloud storage like Box, DropBox, OneDrive and the like impacts how enterprises need to manage their critical digital information. However technology has moved far faster than what organizations have adopted as their ESI policies, and those...
More commonly known as emails, files, attachments, and documents, Electronically Stored Information (ESI) and the policy management around ESI has dra...
|
cena:
60,49 |
![]() |
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector - Volume 4
ISBN: 9781519254597 / Angielski / Miękka / 2015 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming rate. With each breach there are empty promises and finger pointing while the organizations attempt to attribute the hack to a bad actor like Deep Panda based off of exploit kit components that were used in a previous breach. Where are they getting their information? Who knows and who cares because it's almost always wrong and attribution is typically a waste of time as it is an attempt to take the responsibility and public outrage off of the...
In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming ra...
|
cena:
60,49 |
![]() |
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3
ISBN: 9781519234742 / Angielski / Miękka / 2015 / 106 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of anyone studying health IT, HIPAA and healthcare informatics as these are the first victims that will...
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both sta...
|
cena:
60,49 |
![]() |
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1
ISBN: 9781519161505 / Angielski / Miękka / 2015 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated. Bad actors come in all forms with a multitude of methods, motivations and exploits but virtually all of them start...
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and so...
|
cena:
60,49 |