0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.) Loot Price: R1,753
Discovery Miles 17 530
You Save: R220 (11%)
Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.): Jeremy Wittkop

Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.)

Jeremy Wittkop

 (sign in to rate)
List price R1,973 Loot Price R1,753 Discovery Miles 17 530 | Repayment Terms: R164 pm x 12* You Save R220 (11%)

Bookmark and Share

Expected to ship within 10 - 15 working days

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop's security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business?

General

Imprint: Apress
Country of origin: United States
Release date: August 2016
First published: 2016
Authors: Jeremy Wittkop
Dimensions: 254 x 178 x 19mm (L x W x T)
Format: Paperback
Pages: 195
Edition: 1st ed.
ISBN-13: 978-1-4842-2052-8
Categories: Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > Databases > General
Promotions
LSN: 1-4842-2052-8
Barcode: 9781484220528

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners