Warning: Trying to access array offset on false in E:\WWW\html\user.php on line 117 Vijay Varadharajan; Yi Mu Information and Communication Security 9783540666820
Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Описание: This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016. The 40 papers presented in this volume were carefully reviewed and selected from 110 submissions.
Автор: Harkins, Malcolm W. Название: Managing risk and information security ISBN: 1484214560 ISBN-13(EAN): 9781484214565 Издательство: Springer Рейтинг: Цена: 3653.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Chapter 1 Introduction
Chapter 2 Misperception of Risk
Chapter 3 Governance and Internal Partnerships
Chapter 4 External Partnerships
Chapter 5 People Are the Perimeter
Chapter 6 Emerging Capabilities and Usage Models
Chapter 7 A New Security Architecture to Improve Business Agility
Chapter 8 Looking to the Future
Chapter 9 Corporate Social Responsibility
Chapter 10 The 21st Century CISO
Chapter 11 Performance Coaching
Appendix A: References
Автор: Peltier Название: Information Security Policies, Procedures, and Standards ISBN: 0849311373 ISBN-13(EAN): 9780849311376 Издательство: Taylor&Francis Рейтинг: Цена: 15310.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: An effective information security program preserves your information assets and helps you meet business objectives. This book provides the tools you need to select, develop, and apply a security program that can be seen not as a nuisance but as a means to meeting your organization`s goals.
Автор: Berna Ors; Bart Preneel Название: Cryptography and Information Security in the Balkans ISBN: 3319213555 ISBN-13(EAN): 9783319213552 Издательство: Springer Рейтинг: Цена: 5854.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions.
Автор: Vijay Varadharajan; Yi Mu Название: Information Security and Privacy ISBN: 3540423001 ISBN-13(EAN): 9783540423003 Издательство: Springer Рейтинг: Цена: 10976.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This title constitutes the proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001. Among the topics addressed are systems security, network security, trust and access control, authentication, cryptography, cryptanalysis, and digital signatures.
Автор: Josef Pieprzyk; Jennifer Seberry Название: Information Security and Privacy ISBN: 3540619917 ISBN-13(EAN): 9783540619918 Издательство: Springer Рейтинг: Цена: 8537.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: These conference proceedings are organized into topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hacking.
Автор: Yongfei Han; Tatsuaki Okamoto; Sihan Quing Название: Information and Communications Security ISBN: 354063696X ISBN-13(EAN): 9783540636960 Издательство: Springer Рейтинг: Цена: 10976.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This work constitutes the refereed proceedings of the First International Conference on Information and Communications Security. It contains 37 full papers and 11 short papers, divided into sections on topics such as secret sharing, network security, security evaluation and public key systems.
Автор: Colin Boyd; Ed Dawson Название: Information Security and Privacy ISBN: 3540647325 ISBN-13(EAN): 9783540647324 Издательство: Springer Рейтинг: Цена: 10610.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This text constitutes the proceedings of the Information Security and Privacy Conference held in Australia (ACISP `98). Topics include: network security; block ciphers; stream ciphers; authorization codes and Boolean functions; software security and electronic commerce; and public key cryptography.
Автор: Josef Pieprzyk; Rei Safavi-Naini; Jennifer Seberry Название: Information Security and Privacy ISBN: 3540657568 ISBN-13(EAN): 9783540657569 Издательство: Springer Рейтинг: Цена: 8537.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This text presents the proceedings of the 4th Australasian Conference on Information Security and Privacy. Among the topics discussed are Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, address control and electronic commerce.
Описание: Offers an insight into the broader realm of information assurance (IA). This book explains real-world strategies applicable to various systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.
Автор: David Guretz Название: Building a Practical Information Security Program ISBN: 0128020423 ISBN-13(EAN): 9780128020425 Издательство: Elsevier Science Рейтинг: Цена: 8588.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: "
Building a Practical Information Security Program" provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided will enable both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter enables aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business.
The book helps users resolve immediate tactical needs, transform security needs into strategic goals, and ultimately put programs into operation with full lifecycle management. Readers will learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risk.
There is so much noise, marketing, and fear in the industry now that spending and deploying based on generic products and standards is often fruitless and a costly waste of time and energy. This book shows users how to properly plan and implement an infosec program based on business strategy and results. Provides a roadmap on how to build a security program that will protect companies from intrusionShows how to focus the security program on its essential mission and move past FUD (fear, uncertainty, and doubt) to provide business valueTeaches how to build consensus with an effective business-focused programPresents readers with best practices on how to translate technical challenges into business requirements, understand when to go big or go home, how to explore in-depth defense strategies, and how to know when to absorb risk
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru