Lingua: Inglese
Editore: Auerbach Publications Sep 2020, 2020
ISBN 10: 036766996X ISBN 13: 9780367669966
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 43,50
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely.Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan. 256 pp. Englisch.
Lingua: Inglese
Editore: Auerbach Publications Sep 2020, 2020
ISBN 10: 0367658216 ISBN 13: 9780367658212
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 55,80
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.This book explores recent innovations in both poll-site and remote voting systems and their application throughout the world. The requirements of elections are analysed, the available tools and technologies are described, and a variety of modern systems are presented in detail together with discussions of deployments. This is an invaluable resource for election professionals, researchers and policy makers alike. Key Features:Reviews both technical and social aspects of e-votingCovers e-voting protocols, attacks reported on e-voting and new developments on the use of e-votingDesigned for government election practitioners and policy makers who want to understand the threats and opportunities in e-voting and assess its suitability for future elections 480 pp. Englisch.
Lingua: Inglese
Editore: Auerbach Publications Sep 2020, 2020
ISBN 10: 0367658100 ISBN 13: 9780367658106
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 58,30
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that auditors as well as management have the ability to examine high volumes of data and transactions to determine patterns and trends. The increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools. This book takes an auditor from a zero base to an ability to professionally analyze corporate data seeking anomalies. 440 pp. Englisch.
Lingua: Inglese
Editore: Auerbach Publications Sep 2020, 2020
ISBN 10: 0367658518 ISBN 13: 9780367658519
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 58,70
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense. 428 pp. Englisch.
Lingua: Inglese
Editore: Auerbach Publications Sep 2020, 2020
ISBN 10: 0367658747 ISBN 13: 9780367658748
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 58,70
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 364 pp. Englisch.