Angebote zu "Risk" (25 Treffer)

Kategorien

Shops

Information Security Risk Management
€ 39.99 *
ggf. zzgl. Versand

Das Buch fasst alle Sachverhalte zum Risikomanagement zusammen, verbindet sie mit anderen Informationsquellen und umrahmt sie mit vielen Praxistipps, 38 Abbildungen und Tabellen und 14 Fallbeispielen. Wer mit ISO/IEC 27005 arbeiten möchte, für den reicht der unkommentierte Blick in den Standard nicht aus. Die Normenreihe ISO/IEC 27000 ist in den letzten Jahren stark gewachsen und es ist schwer den Überblick zu behalten. Dieses Buch zielt auf den Einsatz in der Praxis und richtet sich an jeden, der seine Entscheidungen auf Grundlage einer fundierten Risikoanalyse treffen will. Zusätzliche Funktionen für Smartphones: 40 QR-Codes mit redaktionell gepflegten Links führen Sie mit Ihrem Smartphone direkt aus dem Buch ins Internet. So gelangen Sie ohne Tippen von der Buchseite aus auf die passende Webseite. Auf diese Weise sind die Vorzüge von Buch und Internet jederzeit für Sie verfügbar. Darüber hinaus steht Ihnen der Autor auf seiner Facebook-Seite und in seinem Blog ´´Klipper on Security´´ als Ansprechpartner zur Verfügung.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Understanding Modern Dive Computers and Operati...
€ 49.99 *
ggf. zzgl. Versand

This brief provides a complete yet concise description of modern dive computers and their operations to date in one source with coupled applications for added understanding. Basic diving principles are detailed with practical computer implementations. Interrelated topics to diving protocols and operational procedures are included. Tests, statistics and correlations of computer models with data are underscored. The exposition also links phase mechanics to dissolved gases in modern decompression theory with mathematical relationships and equations used in dive computer synthesis. Applications focus upon and mimic dive computer operations within model implementations for added understanding. This comprehensive resource includes a complete list of dive computers that are marketed and their staging models, as well as a complete list of diveware marketed and their staging algorithms, linkage of pertinent wet and dry tests to modern computer algorithms, a description of two basic computer models with all constants and parameters, mathematical ansatz of on-the-fly risk for surfacing at any dive depth, detailing of statistical techniques used to validate dive computers from data, and a description of profile Data Banks for computer dive model correlations. The book will find an audience amongst computer scientists, doctors, underwater researchers, engineers, physical and biosciences diving professionals, explorers, chamber technicians, physiologists and technical and recreational divers.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Architecting for Scale
€ 32.99 *
ggf. zzgl. Versand

Teaches techniques for building applications that can handle large quantities of traffic, as well as great variability in traffic without impacting quality of service, covering such topics as availability, risk management, and scaling application.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Incident Management for Operations
€ 23.99 *
ggf. zzgl. Versand

Aiming to help readers deliver high-performance, high reliability, process-oriented IT Operations, the author teaches users how to apply key IMS (Incident Management System) principles to IT operations, how to effectively manage risk, how to implement emergency-response teams and much more, in a book that features real-life case studies. Original.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Foundations of Information Security Based on IS...
€ 25.99 *
ggf. zzgl. Versand

This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers:- The quality requirements an organization may have for information; - The risks associated with these quality requirements;- The countermeasures that are necessary to mitigate these risks;- Ensuring business continuity in the event of a disaster;- When and whether to report incidents outside the organization. The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows:- Fundamental Principles of Security and Information security and Risk management. - Architecture, processes and information, needed for basic understanding of what information security is about. - Business Assets are discussed. - Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.) The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included. This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the ´real´ ISFS exam.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Informationssicherheits-Management
€ 37.99 *
ggf. zzgl. Versand

Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch für die Prüfungsvorbereitung zum ´´Certified Information Security Manager (CISM)´´ nach ISACA. Nach einer Einleitung bereitet der erste Teil des Buches in vier Kapiteln auf das CISM-Examen vor. Diese wurden analog zur Struktur der ISACA - ´´Security Governance´´, ´´Risk Management´´, ´´Security Program Development and Management´´ und ´´Incident Response´´ - gegliedert. Der zweite Teil beschäftigt sich mit dem IT-Grundschutz-Standard des BSI und der Implementierung von Sicherheit anhand eines Baseline-Ansatzes. Der dritte und letzte Teil greift schließlich die vorab diskutierten Aspekte anhand von praktischen Beispielen auf und ergänzt sie durch aktuelle Themen, wie unter anderem das IT-Sicherheitsgesetz. Ein detaillierter Index und ein umfangreiches Glossar runden das Buch ab und machen es zudem zu einem Nachschlagewerk im Bereich des Informationssicherheits-Managements.

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Software Security
€ 69.99 *
ggf. zzgl. Versand

This is the Mobipocket version of the print book. ´´When it comes to software security, the devil is in the details. This book tackles the details.´´ --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies ´´McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle.´´ --Howard A. Schmidt, Former White House Cyber Security Advisor ´´McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall.´´ --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in. This is the Mobipocket version of the print book. When it comes to software security, the devil is in the details. This book tackles the details. --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle. --Howard A. Schmidt, Former White House Cyber Security Advisor McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall. --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Privileged Attack Vectors
€ 21.99 *
ggf. zzgl. Versand

See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Continuous Delivery
€ 37.99 *
ggf. zzgl. Versand

Continuous Delivery shows how tocreate fully automated, repeatable, and reliable processes for rapidly moving changes through build, deploy, test, and release. Using these techniques, software organizations are getting critical fixes and other new releases into production in hours - sometimes even minutes - evenin large projects with complex code bases. Jez Humble and David Farley begin by presenting the high-level principles and practices required to succeed with regular, repeatable, low-risk releases. Next, they introduce the ´´deployment pipeline,´´ an automated process for managing all changes, from check-in to release. Finally, they discuss the ´´ecosystem´´ needed to support deployment pipelines, from infrastructure to data management and governance. The authors introduce many state-of-the-art techniques, including in-production monitoring and tracing, dependency management, and the use of virtualization. For each, they review key issues, demonstrate how to mitigate risks, and identify best practices. Coverage includes · Overcoming ´´anti-patterns´´ that slow down releases and reduce quality · Automating all facets of configuration management and testing · Implementing deployment pipelines at team and organizational levels · Scripting highly-effective automated build and deployment processes · Triggering automated processes whenever a change is made · Automating acceptance testing, from analysis to implementation · Testing capacity and other non-functional requirements · Utilizing continuous deployment, rollbacks, and zero-downtime releases · Managing infrastructure, data, components, dependencies, and versions · Navigating risk management, compliance, and other obstacles Whether you´re a developer, architect, tester, or manager, this book will help you move from idea to release faster than ever - so you can deliver far more value, far more rapidly. Product Description Winner of the 2011 Jolt Excellence Award! Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing process, and improved collaboration between developers, testers, and operations, delivery teams can get changes released in a matter of hours- sometimes even minutes-no matter what the size of a project or the complexity of its code base. Jez Humble and David Farley begin by presenting the foundations of a rapid, reliable, low-risk delivery process. Next, they introduce the ´´deployment pipeline,´´ an automated process for managing all changes, from check-in to release. Finally, they discuss the ´´ecosystem´´ needed to support continuous delivery, from infrastructure, data and configuration management to governance. The authors introduce state-of-the-art techniques, including automated infrastructure management and data migration, and the use of virtualization. For each, they review key issues, identify best practices, and demonstrate how to mitigate risks. Coverage includes . Automating all facets of building, integrating, testing, and deploying software . Implementing deployment pipelines at team and organizational levels . Improving collaboration between developers, testers, and operations . Developing features incrementally on large and distributed teams . Implementing an effective configuration management strategy . Automating acceptance testing, from analysis to implementation . Testing capacity and other non-functional requirements . Implementing continuous deployment and zero-downtime releases . Managing infrastructure, data, components and dependencies . Navigating risk management, compliance, and auditing Whether you´re a developer, systems administrator, tester, or manager, this book will help your organization move from idea to release faster than ever-so you can deliver value to your business rapidly and reliably. Backcover Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing process, and improved collaboration between developers, testers, and operations, delivery teams can get changes released in a matter of hours-

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot
Advanced Software Testing
€ 44.00 *
ggf. zzgl. Versand

This book is written for the technical test analyst who wants to achieve advanced skills in test analysis, design, and execution. With a hands-on, exercise-rich approach, this book teaches how to define and carry out the tasks required to implement a test strategy. You will learn to analyze, design, implement, and execute tests using risk considerations to determine the appropriate effort and priority for tests. This book will help you prepare for the ISTQB Advanced Technical Test Analyst exam. Included are sample exam questions for most of the learning objectives covered by the latest (2012) ISTQB Advanced Level syllabus. The ISTQB certification program is the leading software tester certification program in the world. You can be confident in the value and international stature that the Advanced Technical Test Analyst certificate will offer you. Jamie Mitchell is a consultant who has been working in software testing, test automation, and development for over 20 years. He was a member of the Technical Advisory Group for ASTQB, and one of the primary authors for the ISTQB Advanced Technical Test Analyst 2012 syllabus. With over thirty years of software and systems engineering experience, author Rex Black is President of RBCS, a leader in software, hardware, and systems testing, and the most prolific author practicing in the field of software testing today. Previously, he served as President of both the International and American Software Testing Qualifications Boards (ISTQB and ASTQB).

Anbieter: buecher.de
Stand: Sep 20, 2018
Zum Angebot