Résultat de la recherche
5 recherche sur le mot-clé
'Computer security--Management' 


![]()
Books
How do you engage with your peers when they think you're there to stop them working? Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organisation . Information se[...]
ISBN/ISSN/EAN : 978-1-84928-740-1 Article en page(s) : XII, 116 p. Index. décimale : 364.16 Tags : Data protection--Law and legislation--European Union countries ; Data protection--Law and legislation ; Privacy, Right of--European Union countries ; Computer security--Management Langues: Anglais ![]()
Books
The definitive guide to information security automation technologies Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP provides IT security managers in both government agencies and private organiz[...]
ISBN/ISSN/EAN : 978-0-07-177251-8 Article en page(s) : XVIII, 269 p. Catégories : Index. décimale : 005.8 Tags : SCAP (Computer network protocols) ; Computer networks--Security measures--Standards ; Computer security--Management Langues: Anglais ![]()
Books
Collectif ; Information systems audit and control association isaca | Rolling Meadows, IL : Information Systems Audit and Control Association ISACA | 2012COBIT 5 for Information Security provides guidance to help IT and security professionals understand, utilize, implement and direct important information security-related activities, and make more informed decisions while maintaining awareness ab[...]
ISBN/ISSN/EAN : 978-1-60420-254-0 Article en page(s) : 220 p. Index. décimale : 658.4/038 Tags : Information resources management ; Business enterprises--Information technology--Security measures ; COBIT (Information technology management standard) ; Information technology--Security measures ; Information technology--Management ; Computer security--Management Langues: Anglais ![]()
Books
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to[...]
ISBN/ISSN/EAN : 978-1-119-56026-5 Article en page(s) : XXII, 439 p. Catégories : 4.20 Problèmes sociaux > Criminalité > Terrorisme > Cyberterrorisme
Index. décimale : 005.8 Tags : Computer networks--Security measures ; Computer security ; Computer security--Management ; Information technology--Management Langues: Anglais ![]()
Books
Joffrey Clarhaut ; Franck Ebel ; Nicolas Dupoty ; Jérôme Hennecart ; Frédéric Vicogne | Editions ENI | Epsilon | 2015Ce livre sur la cyberdéfense s'adresse à toute personne sensibilisée au concept de la sécurité dans le domaine industriel. Il a pour objectif d'initier le lecteur aux techniques les plus courantes des attaquants pour lui apprendre comment se déf[...]
ISBN/ISSN/EAN : 978-2-7460-9788-9 Article en page(s) : 337 p. Catégories : Index. décimale : 363.325 900 4 Tags : Computer security ; Computer networks--Security measures ; Computer security--Management ; Computers--Access control ; Industries--Security measures ; Industrial safety--Computer programs ; Industrial safety--Data processing Langues: Français