You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It integrates these best practices into a unified, capability-focused maturity model that encompasses security, business continuity, and IT operations. By using CERT-RMM, organizations can escape silo-driven approaches to managing operational risk and align to achieve strategic resilience management goals. This book both introduces CERT-RMM and presents the model in its entirety. It beg...
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and t...
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. - Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else - Comprehensive coverage by leading experts allows the reader to put current technologies to work - Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them. Due to the widespread use of the Internet in modern society for activities ranging from social networking and entertainment to distribution of utilities and public administration, failures of cybersecurity can threaten almost all aspects of life today. Cybersecurity is a necessity in the modern world, where computers and other electronic devices communicate via networks, and breakdowns in cybersecurity cost society many resources. The aims of cybersecurity are quite simple: data must not be rea...
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN’s sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those t...
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and ...
This title provides managers, executives and other professionals with an innovative method for critical decision-making. The book explains the reasons for decision failures using the Law of Unintended Consequences. This account draws on the work of sociologist Robert K. Merton, psychologists Amos Tversky and Daniel Kahneman, and economist Herbert Simon to identify two primary causes: cognitive biases and bounded rationality. It introduces an innovative method for “test driving” decisions that addresses both causes by combining scenario planning and “what-if” simulations. This method enables professionals to learn safely from virtual mistakes rather than real ones. It also provides four sample test drives of realistic critical decisions as well as two instructional videos to illustrate this new method. This book provides leaders and their support teams with important new tools for analyzing and refining complex decisions that are critical to organizational well-being and survival.
The growth of cybersecurity issues reflects all aspects of our lives, both personal and professional. The rise of cyber-attacks today increases political, business and national interest in finding different ways to resolve them. This book addresses some of the current challenges in information security that are of interest for a wide range of users, such as governments, companies, universities and students. Different topics concerning cybersecurity are discussed here, including educational frameworks and applications of security principles in specific domains.
The global business environment has never been so complex, making supply chains more fragile than ever. A stable business environment seems like a distant dream in today's global marketplace; instability, not stability, has become the norm. Anti-globalization and nationalization, coupled with populist movements and transnational terrorism, just to name a few targeting global supply chains, now pose significant challenges and risks when doing business across the globe. To address such issues, Political Risk Management for the Global Supply Chain: Provides an overview of basic political terminology and political risk management Presents the basic processes of political risk management Examines...