This revision provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. This publication addresses the use of risk informed approaches to establish and enhance computer security policies, programmes; it describes the integration of computer security into the management system of a facility; establishes a systematic approach to identifying facility functions and appropriate computer security measures that protect sensitive digital assets and the facility from the consequence of cyber-attacks consistent with the threat assessment or design basis threat.
"Sinopsis" puede pertenecer a otra edición de este libro.
<p><span>The International Atomic Energy Agency (IAEA) is the world's center of cooperation in the nuclear field. It was set up as the world's "Atom's for Peace" organization in 1957 within the United Nations family. The Agency works with its Member States and multiple partners worldwide to promote safe, secure and peaceful nuclear technologies.</span></p>
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: FW-9789201235206
Cantidad disponible: 3 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 43873218-n
Cantidad disponible: 3 disponibles
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
Paperback. Condición: New. This revision provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. This publication addresses the use of risk informed approaches to establish and enhance computer security policies, programmes; it describes the integration of computer security into the management system of a facility; establishes a systematic approach to identifying facility functions and appropriate computer security measures that protect sensitive digital assets and the facility from the consequence of cyber-attacks consistent with the threat assessment or design basis threat. Nº de ref. del artículo: LU-9789201235206
Cantidad disponible: 2 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 140 pages. 11.00x8.00x0.39 inches. In Stock. Nº de ref. del artículo: __9201235208
Cantidad disponible: 2 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 43873218
Cantidad disponible: 3 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Nº de ref. del artículo: 401093231
Cantidad disponible: 3 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 26396332464
Cantidad disponible: 3 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: New. Nº de ref. del artículo: 43873218-n
Cantidad disponible: 3 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. The publication addresses the use of risk informed approaches to establish and enhance computer security policies, and d. Nº de ref. del artículo: 909506577
Cantidad disponible: 3 disponibles
Librería: Rarewaves.com UK, London, Reino Unido
Paperback. Condición: New. This revision provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. This publication addresses the use of risk informed approaches to establish and enhance computer security policies, programmes; it describes the integration of computer security into the management system of a facility; establishes a systematic approach to identifying facility functions and appropriate computer security measures that protect sensitive digital assets and the facility from the consequence of cyber-attacks consistent with the threat assessment or design basis threat. Nº de ref. del artículo: LU-9789201235206
Cantidad disponible: 2 disponibles