Editore: English
ISBN 10: 9394166076 ISBN 13: 9789394166073
Da: Majestic Books, Hounslow, Regno Unito
EUR 19,75
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. xv, 490 pages, illustrations black and white.
Editore: English
ISBN 10: 9394166076 ISBN 13: 9789394166073
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. xv, 490 pages, illustrations black and white.
Editore: English
ISBN 10: 9394166076 ISBN 13: 9789394166073
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 20,39
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. xv, 490 pages, illustrations black and white.
Editore: DESIDOC, 2022
ISBN 10: 9394166076 ISBN 13: 9789394166073
Da: Vedams eBooks (P) Ltd, New Delhi, India
EUR 31,04
Quantità: 3 disponibili
Aggiungi al carrelloHardcover. Condizione: New. This book is borne out of the experiential learning of its two authors during their long careers in public service. While the objective is to address the compelling need for cyber security awareness in the age of information systems, the focus is on both theory and practice. In an evolving domain such as the cyber security, an understanding of its fundamentals is vital. Keeping this in view, the book starts with the basic concepts behind the development and operation of information systems. As is necessary for a book on security, it highlights threats to information systems next. Guidelines for formulation of cyber security policies and the means for their implementation and operation constitute the middle core of the book. Incorporating cyber security during the many stages of a system development cycle is given due coverage next, followed by a discussion on applicable standards. The penultimate chapter gives an overview of the emerging domain of quantum information technology and its impact on cyber security. The treatment of the subject is at a level accessible to the middle-level managers in public and private organisations. At the same time, experts in the domain too would find something to reflect upon and to evolve new solutions to the persisting problems of cyber security.