You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is intended for anyone who wants to prepare for the Information Security Foundation based on ISO / IEC 27001 exam of EXIN. All information security concepts in this revised edition are based on the ISO/IEC 27001:2013 and ISO/IEC 27002:2022 standards. A realistic case study running throughout the book usefully demonstrates how theory translates into an operating environment. In all these cases, knowledge about information security is important and this book therefore provides insight and background information about the measures that an organization could take to protect information appropriately. Sometimes security measures are enforced by laws and regulations. This practical and easy-to-read book clearly explains the approaches or policy for information security management that most organizations can consider and implement. It covers: The quality requirements an organization may have for information The risks associated with these quality requirements The countermeasures that are necessary to mitigate these risks How to ensure business continuity in the event of a disaster When and whether to report incidents outside the organization.
This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: The quality requirements an organization may have for information; The risks associated with these quality requirements; The countermeasures that are necess...
Note: Also available for this book: 3rd revised edition (2015) 9789401800129; available in two languages: Dutch, English.For trainers free additional material of this book is available. This can be found under the "Training Material" tab. Log in with your trainer account to access the material.Information security issues impact all organizations; however measures used to implement effective measures are often viewed as a businesses barrier costing a great deal of money. This practical title clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers:The ...
This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.
Information Security Foundation based on ISO/IEC 27001 ’22 Courseware is for anyone who wants to deliver courses aimed at passing the ISFS (Information Security Foundation) exam of EXIN. This courseware is primarily developed for a classroom training in Information Security Foundation based on ISO/IEC 27001 ‘22. The basis for this courseware is the study book Foundations of Information Security Based on ISO27001 and ISO27002. The various modules in the courseware relate to paragraphs of this study book, per slide pointing out where additional information on each subject can be found. In Module 7, an ISFS model exam training from the book is given, including an explanation to all multiple...
Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professi...
Besides the Information Security Foundation based on ISO/IEC 27002 Courseware (ISBN: 9789401800600) publication you are advised to obtain the publication Foundations of Information Security Based on ISO27001 and ISO27002 3rd revised edition (ISBN: 9789401800129). Information Security Foundation based on ISO/IEC 27002 Courseware is for anyone who wants to deliver courses aimed at passing the ISFS (Information Security Foundation) exam of EXIN.
In the era before IoT, the world wide web, internet, web 2.0 and social media made people’s lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE). This book aims to present different aspects of IoE, challenges faced by IoE and its applications, divided into 8 chapters. This multifaceted coverage of the various verticals and IoT layers is the main attraction of this book.
A segurança da informação é um tema cada vez mais discutido nos meios tecnológicos e nas empresas de grande e médio porte tamanha a sua importância, dada à dependência tecnológica que a maioria das empresas, senão todas, possuem hoje na atualidade. Este artigo irá abordar a Segurança da Informação embasando-se na motivação de sua crucial importância para a sobrevivência de diversas atividades tendo como metodologia pesquisas em referências bibliográficas e um estudo de caso da implantação de um SGSI com base nas recomendações da ISO/IEC27001/27002 em um órgão de cunho público, onde o trânsito de pessoas é muito intenso e o acesso nem sempre pode ser restrito, e por esta questão deve-se mensurar muito bem as análises com relação à implementação de um SGSI bem como uma política de segurança da informação que vise a proteção dos ativos informacionais, controles de acesso lógico e fisco, ativos de redes, ativos computacionais, serviços lógicos oferecidos aos usuários e rotinas de backups. Análise do que aplicar e os impactos gerados da aplicação de cada camada de segurança em relação à produtividade e usabilidade no ambiente.
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.