5 results (0,12710 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Information Security Management Handbook Volume 4

Information Security Management Handbook Volume 4

Every year in response to advancements in technology and new laws in different countries and regions there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills techniques tools and understanding required of IT security professionals the Information Security Management Handbook Sixth Edition Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security adaptive threat defense Web 2. 0 virtualization data leakage and governance. New material also addresses risk management business continuity planning disaster recovery planning and cryptography. As the risks that threaten the security of our systems continue to evolve it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments new vulnerabilities and possible threats. | Information Security Management Handbook Volume 4

GBP 56.99
1

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Managing Business Projects The Essentials

Managing Business Projects The Essentials

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost it is about business projects as opposed to construction or engineering projects. Although many techniques like schedule management apply to both they are usually applied differently. As its title conveys the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects up to $20 million but often below $1 million. Some literature favors large and mega-projects but for every mega-project there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos. ' Rather it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea which is stated repeatedly is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before around and after the project itself. So while the basic disciplines like engaging with stakeholders managing scope schedules costs risks issues changes and communication are thoroughly explained other important aspects are covered. These include: governance of a project and of a portfolio of projects project selection with its financial and non-financial aspects effective use of the business case through to benefits realization procurement outsourcing and partnership and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors this book is intended for people who are working in business or government at any level or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students although many would benefit from the contents. | Managing Business Projects The Essentials

GBP 52.99
1