Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Computer-based information systems --- MIS (Information systems) --- Management information systems --- Management-informatiesystemen --- Software engineering --- Software-technologie --- Systèmes d'information de gestion --- Technologie du software --- Decision making --- Business --- Software engineering. --- Data processing. --- Software Engineering. --- Data processing --- Decision-making - Data processing. --- Management information systems. --- Business - Data processing. --- Decision making - Data processing.
Choose an application
Choose an application
Recently we have seen several catastrophic events causing huge disruptions, losses, and panic. There is a growing likelihood that these natural disasters and physical and cyber warfare attacks will increase in frequency and lethality, increasingly impacting civilian infrastructure, due to global warming, increased civil unrest and global tensions as international competition increases. Imagine if two or more occur at the same time? Certainly, cyberattacks can be planned, rehearsed, and launched during the middle of one or more natural events. Up until now we have dealt with each of these events by trying to build systems that are better at detecting, preventing, and protecting us against them. Sadly, we have learned that these events cannot be totally prevented or stopped and have taken their toll. There is a rising chorus arguing that we must learn to, both individually and collectively, become more resilient in the face of these disastrous events. But how? The author believes we can learn to do better by becoming more resourceful, innovative, collaborative, and by taking a page from how we fight wars. This book details how these measures can be adapted to keep our systems operational and to rapidly reconstitute lost infrastructure.
Choose an application
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.
Business enterprises --Computer networks --Security measures. --- Computer security. --- Data protection. --- Information technology --Security measures. --- Business enterprises --- Information technology --- Computer security --- Data protection --- Commerce --- Business & Economics --- Marketing & Sales --- Security measures --- Computer networks --- -Information technology --- -Computer security --- 658.478 --- -Security measures --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Security systems --- Hacking --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures. --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Listing 1 - 4 of 4 |
Sort by
|