Résultat de la recherche
3 recherche sur le mot-clé
'Computer security--Management--Standards' 


![]()
Books
Vinod Vasudevan ; Anoop Mangla ; Firosh Ummer ; Sachin Shetty ; Sangita Pakala ; Siddharth Anbalahan | Cambridgeshire : ITGP | 2015Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cyber security threats proliferate and attacks escalate, an[...]
Mention d'édition : 2nd ed. ISBN/ISSN/EAN : 978-1-84928-767-8 Article en page(s) : XII, 248 p. Index. décimale : 658.478 Tags : Business enterprises--Computer networks--Security measures ; Computer security--Management--Standards ; Data protection--Management--Standards ; Risk management--Evaluation ; Management information systems--Security measures ; ISO 27001 Langues: Anglais ![]()
Books
What if you suffer an information security breach? Many books explain how to reduce the risk of information security breaches. Nevertheless, breaches do occur, even to organizations that have taken all reasonable precautions. Information Securit[...]
Mention d'édition : 2nd ed. ISBN/ISSN/EAN : 978-1-84928-583-4 Article en page(s) : XII, 40 p. Catégories : Index. décimale : 005.8 Tags : Business enterprises--Computer networks--Security measures ; Computer security--Management--Standards ; Data protection--Management--Standards Langues: Anglais ![]()
Books
What do you do to keep your business information secure? Information and information systems are vital to every organisation. Our reliance on data and information, and the fact that it is so easy to share, means that everyone is at risk of cyber[...]
Mention d'édition : 2nd ed. ISBN/ISSN/EAN : 978-1-84928-530-8 Article en page(s) : X, 112 p. Catégories : Index. décimale : 005.8 Tags : Business enterprises--Computer networks--Security measures ; Computer security--Management--Standards ; Data protection--Management--Standards ; Confidential business information ; Cyberterrorism Langues: Anglais