Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 58,31
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Taylor & Francis Ltd, London, 2024
ISBN 10: 1032344474 ISBN 13: 9781032344478
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 60,63
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology.The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards.The book:Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparationCovers topics such as managing business assets, agreements on how to deal with business assets, and media handlingDemonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standardsExplains how the organizations assets are managed by asset management, and access control policiesPresents seven case studies The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 62,28
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Idioma: Inglés
Publicado por Springer International Publishing AG, Cham, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 66,47
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: Romtrade Corp., STERLING HEIGHTS, MI, Estados Unidos de America
EUR 66,48
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 63,66
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 54,01
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: SMASS Sellers, IRVING, TX, Estados Unidos de America
EUR 69,38
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
EUR 62,59
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
EUR 56,53
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Idioma: Inglés
Publicado por Scholars' Press 2020-05, 2020
ISBN 10: 6138929950 ISBN 13: 9786138929956
Librería: Chiron Media, Wallingford, Reino Unido
EUR 54,60
Cantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 63,22
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, Cham, 2026
ISBN 10: 3032064384 ISBN 13: 9783032064387
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 75,16
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services.This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics.This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. Its also designed for Cisco Networking Academy students, who are seeking career oriented, entry-level security analyst skills. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 65,49
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Brand New. 215 pages. 9.25x6.10x9.25 inches. In Stock.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 77,10
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 65,49
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Brand New. 450 pages. 9.26x6.11x9.25 inches. In Stock.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 77,88
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 77,27
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. First edition Includes bibliographical references and index.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 63,76
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 82,38
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New. 1st Edition.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 72,30
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 72,29
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 4 working days.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 76,78
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
EUR 81,28
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 72,28
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Taylor & Francis Ltd, London, 2024
ISBN 10: 1032344474 ISBN 13: 9781032344478
Librería: AussieBookSeller, Truganina, VIC, Australia
EUR 58,11
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology.The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards.The book:Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparationCovers topics such as managing business assets, agreements on how to deal with business assets, and media handlingDemonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standardsExplains how the organizations assets are managed by asset management, and access control policiesPresents seven case studies The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing, 2020
ISBN 10: 6202563532 ISBN 13: 9786202563536
Librería: moluna, Greven, Alemania
EUR 45,45
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 83,16
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New.
EUR 93,44
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 95,32
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.