Inicio > > Seguridad informática > Building a Comprehensive IT Security Program
Building a Comprehensive IT Security Program

Building a Comprehensive IT Security Program

Jeremy Wittkop

61,65 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2016
Materia
Seguridad informática
ISBN:
9781484220528
61,65 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:Who is attempting to steal information and why?What are critical information assets?How are effective programs built?How is stolen information capitalized?How do we shift the paradigm to better protect our organizations?How we can make the cyber world safer for everyone to do business?

Artículos relacionados

  • Transformation of Knowledge, Information and Data
    Patrick Van Bommel
    ...
  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    274,88 €

  • Accelerate Model Training with PyTorch 2.X
    Maicon Melo Alves
    Dramatically accelerate the building process of complex models using PyTorch to extract the best performance from any computing environmentKey Features- Reduce the model-building time by applying optimization techniques and approaches- Harness the computing power of multiple devices and machines to boost the training process- Focus on model quality by quickly evaluating differe...
    Disponible

    64,00 €

  • Information Theory for Data Science
    Changho Suh
    Information theory deals with mathematical laws that govern the flow, representation and transmission of information, just as the field of physics concerns laws that govern the behavior of the physical universe. The foundation was made in the context of communication while characterizing the fundamental limits of communication and offering codes (sometimes called algorithms) to...
  • Theory of Decision Under Uncertainty
    Itzhak Gilboa
    ...
    Disponible

    49,52 €

Otros libros del autor

  • The Cybersecurity Playbook for Modern Enterprises
    Jeremy Wittkop
    Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey Features:Understand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishing, and many morePartner with your end user community by building effective sec...
    Disponible

    63,24 €