-
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Manage your own robust, inexpensive cybersecurity testing environment Thi....
Release Date 2020/02 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10