Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Choose an application
Choose an application
Architecture. --- Shapes. --- Shells (Engineering) --- Structural optimization. --- Coques (Ingénierie) --- Optimisation des structures --- Architecture --- Formes --- Structural optimization --- 624.04 --- Structural design. Graphical and analytical statics for investigation and calculation of structures --- Shells (Engineering). --- 624.04 Structural design. Graphical and analytical statics for investigation and calculation of structures --- Coques (Ingénierie) --- Shapes --- Optimal structural design --- Optimization, Structural --- Optimization of structural systems --- Optimum design of structures --- Optimum structural design --- Optimum structures --- Structures, Optimum design of --- Structural design --- Structural shells --- Elastic plates and shells --- Structural analysis (Engineering) --- Plates (Engineering) --- Forms (Shapes) --- Shape --- Geometry --- Surfaces --- Architecture, Western (Western countries) --- Building design --- Buildings --- Construction --- Western architecture (Western countries) --- Art --- Building --- Design and construction --- Architecture, Primitive
Choose an application
Criminology. Victimology --- History as a science --- Crime --- Criminology --- Criminal justice, Administration of --- History --- History. --- Crime - History --- Criminology - History --- Criminal justice, Administration of - History
Choose an application
Providing an introduction to the history of crime and crime control, this title explains the historical background that is essential for an understanding of contemporary criminal justice and examines the historical context for contemporary criminological debates.
Crime --- Criminology --- Criminal justice, Administration of --- History.
Choose an application
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Computer security. --- Computer networks --- Security measures.
Choose an application
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.
Data protection. --- Data encryption (Computer science). --- Security. --- Cryptology.
Choose an application
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Computer security. --- Computer networks --- Security measures.
Choose an application
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom. Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer. Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank. People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program. What You’ll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade.
Computer security. --- Computer science. --- Data encryption (Computer science). --- Computer Science. --- Security. --- Data Encryption. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data protection. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
In an era marked by relentless digital disruption, where every interaction - whether it's a click, a tap, or a swipe - shapes the structure of our interconnected world, the need for transformative action becomes notably clear. This collection brings together a dynamic compilation of insights, carefully selected from leading experts in the field, ready to navigate the uncharted waters of this digital revolution. The collection comprises submissions from two ISPIM (International Society for Professional Innovation Management) events, along with additional contributions. It offers an extensive view that encompasses the various challenges and opportunities brought about by the tumultuous waves of digital disruption and transformation, spanning a wide range of aspects in contemporary business and society. The primary aim of this collection is to emphasize the idea that the emerging global digital economy urgently requires a comprehensive perspective on digitalization, making it central for all institutions. Contributions in this collection shed light on important subjects, including, but not limited to, The Evolution of Digital Transformation, Skills and Knowledge Requirements in the Era of Digital Transformations, and Data-Driven Foresight. Within the boundaries of this scholarly endeavor, a deep understanding of the intricate network of digitalization and its consequences is nurtured. As the relentless surge of digitalization continues, this collection serves as an invaluable guide for discerning scholars and practitioners alike, inviting them to navigate this transformative period with wisdom and expertise. .
Listing 1 - 10 of 10 |
Sort by
|