0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents (Paperback, 1st ed.): Eric C. Thompson Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents (Paperback, 1st ed.)
Eric C. Thompson
R1,391 R1,144 Discovery Miles 11 440 Save R247 (18%) Ships in 18 - 22 working days

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You'll Learn Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team Who This Book Is For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong

Building a HIPAA-Compliant Cybersecurity Program - Using NIST 800-30 and CSF to Secure Protected Health Information (Paperback,... Building a HIPAA-Compliant Cybersecurity Program - Using NIST 800-30 and CSF to Secure Protected Health Information (Paperback, 1st ed.)
Eric C. Thompson
R2,414 R2,167 Discovery Miles 21 670 Save R247 (10%) Ships in 18 - 22 working days

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program. With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI. Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers: Understand and document all known instances where patient data exist Know what regulators want and expect from the risk analysis process Assess and analyze the level of severity that each risk poses to ePHI Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives What You'll Learn Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR) Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI Leverage the risk analysis process to improve your cybersecurity program Know the value of integrating technical assessments to further define risk management activities Employ an iterative process that continuously assesses the environment to identify improvement opportunities Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information

Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

Attitudes and Awareness Towards ASEAN - Findings of a Ten-nation Survey (Paperback): Eric C. Thompson, Thianthai Chulanee Attitudes and Awareness Towards ASEAN - Findings of a Ten-nation Survey (Paperback)
Eric C. Thompson, Thianthai Chulanee
R529 R483 Discovery Miles 4 830 Save R46 (9%) Ships in 18 - 22 working days

This report shares results of a regionwide survey undertaken in late 2007 among over 2,000 students from leading universities across ASEAN member countries. The survey addressed questions on whether youths today consider themselves to be citizens of ASEAN; whether the region's youth are enthusiastic or skeptical about ASEAN; how well the region's youth know ASEAN and its members; and their concerns for the Association and the region. Survey findings indicate a nascent sense of ownership and stake in ASEAN, despite some clear differences in knowledge and opinions on the grouping. It is interesting to note that the students agreed on the importance of economic cooperation and addressing poverty and development needs; and share a desire to know more about the region. Responses from the survey provide a useful source of information for ASEAN policy-makers on promoting awareness about ASEAN and the challenges and opportunities the region faces in pursuing regional integration.

Southeast Asian Anthropologies - National Traditions and Transnational Practices (Paperback): Eric C. Thompson, Vineeta Sinha Southeast Asian Anthropologies - National Traditions and Transnational Practices (Paperback)
Eric C. Thompson, Vineeta Sinha
R875 R826 Discovery Miles 8 260 Save R49 (6%) Ships in 10 - 15 working days

Anthropology is a flourishing discipline in Southeast Asia. Southeast Asian Anthropologies renders visible the development of national traditions and transnational practices of anthropology across the region. The authors are practising anthropologists and Southeast Asian scholars with decades of experience working in the intellectual traditions and institutions that have taken root in Southeast Asia since the mid-twentieth century.Anthropology's self-criticism of the colonial, postcolonial and neo-colonial conditions of its own production remains relevant for Southeast Asia. There has been a vigorous debate and a wide range of suggestions on what might be done to de-center the Euro-, andro-, hetero- and other centrisms of the discipline from an emerging world anthropologies perspective. But actually transforming anthropology requires practice beyond mere critique. The chapters in this volume focus on practices and paradigms of anthropologists working from and within Southeast Asia. Three overlapping issues are addressed in these pages: First, the historical development of unique traditions of research, scholarship, and social engagement across diverse anthropological communities of the region, which have adopted and adapted different anthropological trends to their local circumstances; Second, the opportunities and challenges faced by Southeast Asian anthropologists as they practise their craft in different institutional and political contexts; and Third, the emergence of locally-grounded, intra-regional, transnational linkages and practices undertaken by Southeast Asian-based anthropologists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Motion and the English Verb - A…
Judith Huber Hardcover R3,285 Discovery Miles 32 850
Kung Fu San Soo - A Formidable Foe
Marcus Woods Hardcover R695 Discovery Miles 6 950
The Oxford Handbook of Pragmatics
Yan Huang Hardcover R4,534 Discovery Miles 45 340
Asterix en die Hoofman se Skild
Rene Goscinny Paperback  (1)
R220 Discovery Miles 2 200
Allapattah - 17th Avenue Property…
Megan R Mclaughlin Hardcover R1,372 Discovery Miles 13 720
Holding On When You Want To Let Go…
Sheila Walsh Paperback R150 R138 Discovery Miles 1 380
Fuzzy Logic and Soft Computing…
Ioan Dzitac, Sorin Nadaban Hardcover R1,787 R1,535 Discovery Miles 15 350
Cowboy Jesse
Nancy Allen Hardcover R561 R515 Discovery Miles 5 150
The Humble Investor - How To Find A…
Daniel Rasmussen Paperback R709 R659 Discovery Miles 6 590
Salton Precise Point Steam, Spray and…
 (1)
R319 R260 Discovery Miles 2 600

 

Partners