0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Security Architecture - How & Why (Hardcover): Tom Madsen Security Architecture - How & Why (Hardcover)
Tom Madsen
R2,807 Discovery Miles 28 070 Ships in 9 - 17 working days

Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of Security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job, for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which is being implemented. This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focusses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

The Art of War for Computer Security (Hardcover, 1st ed. 2019): Tom Madsen The Art of War for Computer Security (Hardcover, 1st ed. 2019)
Tom Madsen
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.

The Art of War for Computer Security (Paperback, 1st ed. 2019): Tom Madsen The Art of War for Computer Security (Paperback, 1st ed. 2019)
Tom Madsen
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.

Relentless - From Both Sides of the Veil (Paperback): Tom Madsen Relentless - From Both Sides of the Veil (Paperback)
Tom Madsen
R650 R614 Discovery Miles 6 140 Save R36 (6%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Confronting Inequality - The South…
Michael Nassen Smith Paperback R261 Discovery Miles 2 610
Free Boundary Problems Involving Solids
J.M. Chadam, Helen Rasmussen Hardcover R3,815 R3,499 Discovery Miles 34 990
Redemption - 2017 Tales from the Writers…
Bernie Dowling, Vera M Murray, … Hardcover R788 Discovery Miles 7 880
Recent Advances in Structural Joints and…
Liyong Tong, C. Soutis Hardcover R4,039 Discovery Miles 40 390
The Astral Plane
C.W. Leadbeater Hardcover R714 Discovery Miles 7 140
Advances in Communication and Computing
Prabin Kumar Bora, S R Mahadeva Prasanna, … Hardcover R4,215 R3,415 Discovery Miles 34 150
The Great War, 1914-1918
Spencer Tucker Hardcover R4,206 Discovery Miles 42 060
Virtual Reality in Education…
Information Reso Management Association Hardcover R5,983 Discovery Miles 59 830
Opwipsprokie: Die Slapende Skoonheid
North Parade Publishing, Elsa Silke Hardcover R265 R195 Discovery Miles 1 950
The Gospel of Mary
Christopher Tuckett Hardcover R5,555 Discovery Miles 55 550

 

Partners