Cyber Security

Cyber Security

Cyber Security

David Sutton

46,94 €
IVA incluido
Consulta disponibilidad
Editorial:
BCS Learning and Development Ltd
Año de edición:
2017
Materia
Privacidad y protección de datos
ISBN:
9781780173405
Añadir a favoritos

Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving personal details open to the risk of falling into the wrong hands. Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book is crucial reading for businesses wanting to better understand security risks and ensure the safety of organisational and customer data but will also be valuable to anyone concerned with data protection.''The BCS Cyber Security book is well written and easy to read, which is unusual in a book addressing this subject matter. The author takes the time to describe his interpretation of “Cyber” as this term is often misused both within and outside the industry. The book makes many references to real world examples and their consequences. This helps to illuminate the threats and vulnerabilities and helps us understand the possible actions that should be taken. The book is well structured with two major sections; Cyber Security Problems - encompassing Cyber Security Issues, Targets, Vulnerabilities, Threats and Impacts and Improving Cyber Security - encompassing Risk Management, Business Continuity, Disaster Recovery and risk mitigations. The final part of the book is a comprehensive analysis of applicable standards, good practice guidelines and the law. This practitioners guide is a must have for those with an interest in information security, either as a potential career or to expand their general business knowledge. Highly recommended!''Terry Neal, InfoSec Skills Limited, CEO, FBCS, CITP --''David takes the reader on an engaging and informative journey covering the major topics that make up cyber security. Highly recommended for anyone interested in learning at a high level what cyber security is, what it means and why it is important.''Adrian Davis, (ISC)² Inc., Managing Director EMEA

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Safe Surfer
    Martin Hellweg
    ...
  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...

Otros libros del autor

  • Reach for Your Star
    David Sutton
    In Reach for Your Star, the author takes readers on a journey through life using the art of poetry. With pieces that range from humorous to serious, these poems capture the many facets of the human experience and the ways in which we express ourselves. Whether through the arts, sports, academics, charity work, or dedication to a cause, we all seek out paths that allow us to be ...
  • Cyber Security
    David Sutton
    Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. ...
    Disponible

    46,87 €

  • Information Risk Management
    David Sutton
    Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This book provides practical guidance to the principles and development of a strategic approach to an IRM programme. The only textbook for the BCS Practitioner Certificate in Information Risk Management. ...
    Disponible

    55,46 €

  • Business Continuity in a Cyber World
    David Sutton
    Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyber-attacks are now an everyday occurrence, and it is becoming clear that the impact of these can have devastating effects on organizations whether large or small, public or...
    Disponible

    18,34 €

  • Pray Listen
    David Sutton
    I thought I had it all: a successful family business, money, fast cars, friends and a loving family. Well, life is full of surprises, isn’t it? Shit happens as they say, and when trouble comes knocking on your door, you fight or flee. In my case battles came and went, I would never yield, always compromise, but when a couple of unforeseen incidents came my way, I needed help. I...
  • Information Risk Management
    David Sutton
    Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information can mean the difference between success and ruin. Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book is a practical guide to understanding the principle...