Listing 1 - 4 of 4 |
Sort by
|
Choose an application
The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, COBIT and ITIL. Covers: risk management, security controls, security management and how to translate business drivers into security objectives and targets
Choose an application
"The journal promotes and expedites the dissemination of new research results.There is an exciting and large volume of research activity in the field worldwide.The goal of this journal is to provide a platform for academicians and scientists all over the world to share, promote, and discuss various new issues and developments in different areas of electronics engineering and information science"--"Aims & scope", viewed March 4, 2020.
Electronics --- Circuits and Systems --- Electronic Information Engineering --- Information Systems Security --- Information science --- Information science. --- Electronics. --- Electrical engineering --- Physical sciences --- Communication --- Information literacy --- Library science --- electronics --- circuits and systems --- electronic information engineering --- information systems security
Choose an application
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverin
Computer security --- Information technology. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Algorithms --- Architectures --- Information systems security
Choose an application
The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Security Operations and Administration Access Controls Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.
Listing 1 - 4 of 4 |
Sort by
|