0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,149)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R4,506 Discovery Miles 45 060 Ships in 10 - 15 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

Flexible Network Architectures Security - Principles and Issues (Paperback): Bhawana Rudra Flexible Network Architectures Security - Principles and Issues (Paperback)
Bhawana Rudra
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback)
Michael Erbschloe
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,480 Discovery Miles 14 800 Ships in 10 - 15 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Fraud Hotlines - Design, Performance, and Assessment (Paperback): Chelsea A. Binns Fraud Hotlines - Design, Performance, and Assessment (Paperback)
Chelsea A. Binns
R1,120 Discovery Miles 11 200 Ships in 10 - 15 working days

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines.

A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Hardcover): Meg Tyler A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Hardcover)
Meg Tyler
R4,497 Discovery Miles 44 970 Ships in 10 - 15 working days

A formal analysis A Singing Contest comprises close readings of Seamus
Heaney's poetry. Tyler argues that in an era of fractured poetry and politics, Seamus Heaney stands out: his impulse is towards unity and regeneration. Her book considers the interplay between different kinds of literary tradition and community in his poetry. For Heaney, poetry represents a structure allowing imaginative mediation of conflicts that appear irreconcilable in the social, political and historical realms. By detailed structural analysis of diction, meter, imagery and generic form, Tyler illustrates how Heaney's poems create concords from discords, unities from fracture.
From the preface by Rosanna Warren:
"A Singing Contest is written with imaginative and emotional urgency, and in some large sense, as it examines Heaney's spells, it seems itself to want to cast a spell against death. Hence Tyler's return, in various ways, to readings of elegy, whether the fictive elegies of classical pastoral poems, or Heaney's personal elegies. She pores in detail over "Clearances," the sonnet sequence composed in memory of the poet's mother in The Haw Lantern, and she concludes her book with a chapter on literary elegies, Heaney's farewells to his friends and admired contemporaries Ted Hughes, Zbigniew Herbert, and Joseph Brodsky. In these analyses, one sees the wholeness of Tyler's project: her argument that for Heaney, literary tradition itself, rightly received and transformed, reaches into the voids made by death, and establishes connection across rupture. Her thesis is an ancient one, and she gives it particular shape and force in asking us to contemplate it at work in Heaney, where it binds individualto collective experience, and past to present."

Introduction to Industrial Automation (Paperback, 3rd Edition): George Nikolakopoulos, Stamatios Manesis Introduction to Industrial Automation (Paperback, 3rd Edition)
George Nikolakopoulos, Stamatios Manesis
R1,200 R1,133 Discovery Miles 11 330 Save R67 (6%) Ships with 15 working days

This book provides an extended overview and fundamental knowledge in industrial automation, while building the necessary knowledge level for further specialization in advanced concepts of industrial automation. It covers a number of central concepts of industrial automation, such as basic automation elements, hardware components for automation and process control, the latch principle, industrial automation synthesis, logical design for automation, electropneumatic automation, industrial networks, basic programming in PLC, and PID in the industry.

Table of Contents

Introduction to Automation. Hardware Components for Automation and Process Control. Industrial Automation Synthesis. Logical Design of Industrial Automation. Basic Components of Electro Pneumatic Automation. Industrial Networks. Basic Programming Principles of PLCs Author. PID Control in the Industry.

The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover): Rahul Verma, Manisha... The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover)
Rahul Verma, Manisha Mathur, Divya Gupta Chowdhry
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book begins with a section on Digital Business Transformation, which includes chapters on tools for integrated marketing communications, human resource workplace digitalization, the integration of the Internet of Things in the workplace, Big Data, and more. The technologies discussed aim to help businesses and entrepreneurs transform themselves to align with today's modern digital climate. The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the development and management of conducting business online as well as for those responsible for cyber protection and security. Faculty and students, researchers, and industry professionals will find much of value in this volume.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R5,701 Discovery Miles 57 010 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R885 Discovery Miles 8 850 Ships in 10 - 15 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Security Management of Next Generation Telecommunications Networks and Services (Hardcover): S. Jacobs Security Management of Next Generation Telecommunications Networks and Services (Hardcover)
S. Jacobs
R3,219 Discovery Miles 32 190 Ships in 18 - 22 working days

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

The HIPAA Program Reference Handbook (Hardcover, New): Ross A. Leo The HIPAA Program Reference Handbook (Hardcover, New)
Ross A. Leo
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks (Hardcover): R.R. Brooks Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks (Hardcover)
R.R. Brooks
R4,662 Discovery Miles 46 620 Ships in 10 - 15 working days

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

Exploring the Security Landscape: Non-Traditional Security Challenges (Hardcover, 1st ed. 2016): Anthony J. Masys Exploring the Security Landscape: Non-Traditional Security Challenges (Hardcover, 1st ed. 2016)
Anthony J. Masys
R2,715 Discovery Miles 27 150 Ships in 18 - 22 working days

This book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations.

The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover)
James S. Tiller
R3,950 Discovery Miles 39 500 Ships in 10 - 15 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.

The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization.

Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Handbook of SCADA/Control Systems Security (Paperback, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Paperback, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R1,408 Discovery Miles 14 080 Ships in 10 - 15 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,394 Discovery Miles 13 940 Ships in 10 - 15 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018): Swarup Bhunia, Mark M. Tehranipoor The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018)
Swarup Bhunia, Mark M. Tehranipoor
R4,477 Discovery Miles 44 770 Ships in 10 - 15 working days

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Handbook of Image-Based Security Techniques (Paperback): Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri Handbook of Image-Based Security Techniques (Paperback)
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,092 Discovery Miles 10 920 Ships in 10 - 15 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Surviving Security - How to Integrate People, Process, and Technology (Hardcover, 2nd edition): Amanda Andress Surviving Security - How to Integrate People, Process, and Technology (Hardcover, 2nd edition)
Amanda Andress
R3,974 Discovery Miles 39 740 Ships in 10 - 15 working days

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions.

About the Author
Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.

Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback): Ariel Evans Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback)
Ariel Evans
R1,247 Discovery Miles 12 470 Ships in 9 - 17 working days

Addresses one of the hottest issues facing all businesses today, and one that can destroy companies overnight - cybersecurity. Identifies how to implement cybersecurity strategy and practices in a straightforward way. Demystifies a crucial topic for executives, taking it away from an information technology issue and making it understandable for business leaders and board members with governance oversight. Ideal reading for executives, and also students on the growing number of courses on this topic.

Network Perimeter Security - Building Defense In-Depth (Hardcover): Cliff Riggs Network Perimeter Security - Building Defense In-Depth (Hardcover)
Cliff Riggs
R3,959 Discovery Miles 39 590 Ships in 10 - 15 working days

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.

Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process.

Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition)
Leighton Johnson
R2,148 Discovery Miles 21 480 Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado Hardcover R5,991 Discovery Miles 59 910
Semantic Modeling and Enrichment of…
Abdulbaki Uzun Hardcover R2,667 Discovery Miles 26 670
Love Is Free. Guac Is Extra. - How…
Monty Moran Hardcover R654 Discovery Miles 6 540
Fundamentals Of Project Management…
Rory Burke Paperback  (2)
R495 R457 Discovery Miles 4 570
Real-Time Systems Development
Rob Williams Paperback R1,319 Discovery Miles 13 190
Handbook of Research on Enterprise…
Jatinder N.D. Gupta (The University of Alabama in Huntsville, USA), Mohammad A. Rashid, … Hardcover R6,657 Discovery Miles 66 570
Winning the SoC Revolution - Experiences…
Grant Martin, Henry Chang Hardcover R4,050 Discovery Miles 40 500
Building Intelligent Agents - An…
Gheorghe Tecuci Paperback R2,387 Discovery Miles 23 870
Economic And Management Research
Peet Venter Paperback R678 Discovery Miles 6 780
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450

 

Partners