Establish yourself as a Salesforce security expert by mastering cybersecurity concepts, advanced configurations, and coding strategies to safeguard data, secure access, and build trust with your customers and end users Key Features ...Lasīt vairāk
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machin...Lasīt vairāk
(Izdošanas datums: 01-May-2025, Hardback, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781394331857)
This book is an essential resource for anyone looking to protect their organization in the digital age; whether running a small business, managing a medium-sized company, or leading a large corporation, this book contains strategies that will fit al...Lasīt vairāk
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threa...Lasīt vairāk
This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of...Lasīt vairāk
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and dep...Lasīt vairāk
Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly,...Lasīt vairāk
Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly,...Lasīt vairāk
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threa...Lasīt vairāk
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and v...Lasīt vairāk
This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of...Lasīt vairāk
The wave of data breaches raises two pressing questions: Why dont we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Dont We Defend Better : Data Breaches, Risk Management, and Publi...Lasīt vairāk
This is Ciscos official, comprehensive self-study resource for Cisco&;s ENSLD 300-420 exam (Designing Cisco Enterprise Networks), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Enter...Lasīt vairāk
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Lasīt vairāk
Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly,...Lasīt vairāk
Information Security Policies, Procedures, and Standards: A Practitioners Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001,...Lasīt vairāk
(Izdošanas datums: 17-Aug-2020, Paperback / softback, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781119679325)
You will be breached—the only question is whether youll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breac...Lasīt vairāk
(Izdošanas datums: 15-Jun-2020, Other digital carrier, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781119679349)
Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
You will be breached—the only question is whether youll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breac...Lasīt vairāk
(Izdošanas datums: 18-Apr-2020, Other digital carrier, Izdevniecība: Wiley-Blackwell, ISBN-13: 9781119720362)
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT...Lasīt vairāk
The wave of data breaches raises two pressing questions: Why dont we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Dont We Defend Better : Data Breaches, Risk Management, and Public P...Lasīt vairāk