Listing 1 - 10 of 182 << page
of 19
>>
Sort by

Book
Industry of anonymity : inside the business of cybercrime
Author:
ISBN: 0674989023 067498904X Year: 2018 Publisher: Cambridge, MA : Harvard University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.


Periodical
Penalmente Relevant
ISSN: 25011367 Publisher: [S.l.]

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Dictionary of terrorism
Author:
Year: 2004 Publisher: London ; New York, NY : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Building an effective security program.
Authors: --- ---
ISBN: 1501506528 1501506420 Year: 2020 Publisher: Boston, Massachusetts : DE GRUYTER,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.


Book
The public core of the internet : an international agenda for internet governance
Author:
Year: 2016 Publisher: Amsterdam University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth and health of our digital economies and societies depend on the core protocols and infrastructure of the Internet. This technical and logical substructure of our digital existence is now in need of protection against unwarranted interference in order to sustain the growth and the integrity of the global Internet. The Internet's key protocols and infrastructure can be considered a global public good that provides benefits to everyone in the world. Countering the growing state interference with this 'public core of the Internet' requires a new international agenda for Internet governance that departs from the notion of a global public good. Core ingredients of this strategy are: - To establish and disseminate an international norm stipulating that the Internet's public core - its main protocols and infrastructure- should be considered a neutral zone, safeguarded against unwarranted intervention by governments.- To advocate efforts to clearly differentiate at the national and international level between Internet security (security of the Internet infrastructure) and national security (security through the Internet).- To broaden the arena for cyber diplomacy to include new coalitions of states (including the so called 'swing states') and private companies, including the large Internet companies as well as Internet intermediaries such as Internet Service Providers.


Book
Computer crime : convention between the United States of America and Other Governments done at Budapest, November 23, 2001.
Author:
Year: 2007 Publisher: [Washington, D.C.] : U.S. Dept. of State,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer crime : convention between the United States of America and Other Governments done at Budapest, November 23, 2001.
Author:
Year: 2007 Publisher: [Washington, D.C.] : U.S. Dept. of State,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cybersecurity management : an organizational and strategic approach.
Author:
ISBN: 1487531257 1487531249 Year: 2021 Publisher: Toronto : University of Toronto Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.


Book
IT Leaks : alles wat je liever niet over IT wilt weten
Author:
ISBN: 9789043023429 Year: 2012 Publisher: Amsterdam Pearson Education Benelux

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dit is geen IT-boek.Het is een boek over de gevaren van IT en over hoe het zover gekomen is. Het legt aan de hand van de geschiedenis van de IT uit hoe het komt dat IT-projecten zo vaak mislukken, hoe soms willens en wetens miljoenen verspild worden en hoe het anders kan. Je leest waarom criminelen zich steeds vaker richten op IT en hoe onze hele economie steeds afhankelijker wordt van rammelende IT-oplossingen.Het boek is een leesbare, spannende en humoristische uiteenzetting over zowel alledaagse problemen als over mislukte megaprojecten. Een boek dat iedereen zou moeten lezen.bron : http://www.pearsoneducation.nl


Book
Veilig online
Authors: ---
ISBN: 9789463560528 Year: 2018 Publisher: Culemborg Van Duuren Media

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 182 << page
of 19
>>
Sort by