|
Showing 1 - 3 of
3 matches in All Departments
This book concentrates on a wide range of advances related to IT
cybersecurity management. The topics covered in this book include,
among others, management techniques in security, IT risk
management, the impact of technologies and techniques on security
management, regulatory techniques and issues, surveillance
technologies, security policies, security for protocol management,
location management, GOS management, resource management, channel
management, and mobility management. The authors also discuss
digital contents copyright protection, system security management,
network security management, security management in network
equipment, storage area networks (SAN) management, information
security management, government security policy, web penetration
testing, security operations, and vulnerabilities management. The
authors introduce the concepts, techniques, methods, approaches and
trends needed by cybersecurity management specialists and educators
for keeping current their cybersecurity management knowledge.
Further, they provide a glimpse of future directions where
cybersecurity management techniques, policies, applications, and
theories are headed. The book is a rich collection of carefully
selected and reviewed manuscripts written by diverse cybersecurity
management experts in the listed fields and edited by prominent
cybersecurity management researchers and specialists.
This book provides an essential compilation of relevant and cutting
edge academic and industry work on key cybersecurity applications
topics. Further, it introduces cybersecurity applications to the
public at large to develop their cybersecurity applications
knowledge and awareness. The book concentrates on a wide range of
advances related to Cybersecurity Applications which include, among
others, applications in the areas of Data Science, Internet of
Things, Artificial Intelligence, Robotics, Web, High-Tech Systems,
Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud
Computing. It introduces the concepts, techniques, methods,
approaches and trends needed by cybersecurity application
specialists and educators for keeping current their cybersecurity
applications knowledge. Further, it provides a glimpse of future
directions where cybersecurity applications are headed. The book
can be a valuable resource to applied cybersecurity experts towards
their professional development efforts and to students as a
supplement to their cybersecurity courses.
This book concentrates on a wide range of advances related to IT
cybersecurity management. The topics covered in this book include,
among others, management techniques in security, IT risk
management, the impact of technologies and techniques on security
management, regulatory techniques and issues, surveillance
technologies, security policies, security for protocol management,
location management, GOS management, resource management, channel
management, and mobility management. The authors also discuss
digital contents copyright protection, system security management,
network security management, security management in network
equipment, storage area networks (SAN) management, information
security management, government security policy, web penetration
testing, security operations, and vulnerabilities management. The
authors introduce the concepts, techniques, methods, approaches and
trends needed by cybersecurity management specialists and educators
for keeping current their cybersecurity management knowledge.
Further, they provide a glimpse of future directions where
cybersecurity management techniques, policies, applications, and
theories are headed. The book is a rich collection of carefully
selected and reviewed manuscripts written by diverse cybersecurity
management experts in the listed fields and edited by prominent
cybersecurity management researchers and specialists.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
|