| |
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The...
Editeur :
Apress
Parution :
2017-11-11
PDF, ePub
|
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...
Editeur :
Springer
Parution :
2017-10-30
PDF, ePub
|
With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies...
Editeur :
SAGE Publications Ltd
Parution :
2017-07-15
PDF
|
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie zum Schutz von Daten. Es ist damit wertvolles Hilfsmittel für...
Editeur :
Springer Vieweg
Parution :
2017-07-10
PDF, ePub
|
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.This book...
Editeur :
Apress
Parution :
2017-07-02
PDF, ePub
|
50 Jahre Lehre in Informatik an den drei Münchner Universitäten (Ludwig-Maximilians-Universität, Technische Universität München und Universität der Bundeswehr Neubiberg) sind der Anlass für diese Sammlung aktueller Informatik-Aktivitäten in Forschung und Lehre im Jahr...
Editeur :
Springer Vieweg
Parution :
2017-06-29
PDF, ePub
|
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein...
Editeur :
Springer Vieweg
Parution :
2017-06-13
PDF, ePub
|
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
Editeur :
Springer
Parution :
2017-06-13
PDF, ePub
|
Cell Phone Location Evidence for Legal Professionals: UnderstandingCell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the...
Editeur :
Academic Press
Parution :
2017-06-12
epub sans DRM
|
Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately...
Editeur :
Butterworth-Heinemann
Parution :
2017-05-19
PDF, epub sans DRM
|
This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....
Editeur :
Springer
Parution :
2017-05-11
PDF, ePub
|
Research Methods in Human-Computer Interaction is a comprehensive guide to performing research and is essential reading for both quantitative and qualitative methods. Since the first edition was published in 2009, the book has been adopted for use at leading...
Editeur :
Morgan Kaufmann
Parution :
2017-04-28
PDF, epub sans DRM
|
Das Buch bietet einen praxisbezogenen Leitfaden für das Informationssicherheits-, IT- und Cyber-Risikomanagement im Unternehmen – es ist branchenneutral und nimmt Bezug auf relevante Konzepte und Standards des Risikomanagements und der Governance (z.B. COBIT, NIST SP...
Editeur :
Springer Vieweg
Parution :
2017-04-19
Collection :
Edition
PDF, ePub
|
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question,...
Editeur :
Syngress
Parution :
2017-04-19
epub sans DRM
|
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for...
Editeur :
Iste Press - Elsevier
Parution :
2017-04-11
PDF, epub sans DRM
|
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not...
Editeur :
Wiley
Parution :
2017-02-27
PDF, ePub
|
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs...
Editeur :
Apress
Parution :
2017-01-12
PDF, ePub
|
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards,...
Editeur :
Syngress
Parution :
2017-01-05
PDF, epub sans DRM
|
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as...
Editeur :
Springer
Parution :
2016-12-21
PDF, ePub
|
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network...
Editeur :
Apress
Parution :
2016-12-10
PDF, ePub
|