Angebote zu "Risk" (26 Treffer)

Kategorien

Shops

Information Security Risk Management
€ 39.99 *
ggf. zzgl. Versand

Das Buch fasst alle Sachverhalte zum Risikomanagement zusammen, verbindet sie mit anderen Informationsquellen und umrahmt sie mit vielen Praxistipps, 38 Abbildungen und Tabellen und 14 Fallbeispielen. Wer mit ISO/IEC 27005 arbeiten möchte, für den reicht der unkommentierte Blick in den Standard nicht aus. Die Normenreihe ISO/IEC 27000 ist in den letzten Jahren stark gewachsen und es ist schwer den Überblick zu behalten. Dieses Buch zielt auf den Einsatz in der Praxis und richtet sich an jeden, der seine Entscheidungen auf Grundlage einer fundierten Risikoanalyse treffen will. Zusätzliche Funktionen für Smartphones: 40 QR-Codes mit redaktionell gepflegten Links führen Sie mit Ihrem Smartphone direkt aus dem Buch ins Internet. So gelangen Sie ohne Tippen von der Buchseite aus auf die passende Webseite. Auf diese Weise sind die Vorzüge von Buch und Internet jederzeit für Sie verfügbar. Darüber hinaus steht Ihnen der Autor auf seiner Facebook-Seite und in seinem Blog ´´Klipper on Security´´ als Ansprechpartner zur Verfügung.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Financial Cybersecurity Risk Management
€ 26.99 *
ggf. zzgl. Versand

Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options. Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures. Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting. What You´ll Learn Analyze the threat and vulnerability landscape confronting the financial sector Implement effective technology risk assessment practices and methodologies Craft strategies to treat observed risks in financial systems Improve the effectiveness of enterprise cybersecurity capabilities Evaluate critical aspects of cybersecurity governance, including executive and board oversight Identify significant cybersecurity operational challenges Consider the impact of the cybersecurity mission across the enterprise Leverage cybersecurity regulatory and industry standards to help manage financial services risks Use cybersecurity scenarios to measure systemic risks in financial systems environments Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures Who This Book Is For Decision makers, cyber leaders, and front-line professionals, including: chief risk officers, operational risk officers, chief information security officers, chief security officers, chief information officers, enterprise risk managers, cybersecurity operations directors, technology and cybersecurity risk analysts, cybersecurity architects and engineers, and compliance officers

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Architecting for Scale
€ 33.99 *
ggf. zzgl. Versand

Teaches techniques for building applications that can handle large quantities of traffic, as well as great variability in traffic without impacting quality of service, covering such topics as availability, risk management, and scaling application.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Design Sprint
€ 32.99 *
ggf. zzgl. Versand

In the world of digital products, the future is difficult to predict and success requires reducing the risk of failure. The book codifies and captures a common language and process for design sprints, making them accessible to anyone, and enabling businesses and teams to build products that are successful. The design sprint is the first and often the most significant phase of a design thinking process. It gets the entire product design and development team on the same page, reduces the risk of downstream mistakes, and helps validate customer and user interest in a proposed product idea. Written in a collegial, down-to-earth style with a pragmatic bend, this is the first book that specifically focuses on the design sprint methodology. * Get an eye-opening approach to the product design process that results in better, faster outcomes * Learn the design sprint process from start to finish, including essential tools, tips, and best practices * Explore interviews and cases on design sprints from professionals across the design industry

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Continuous Integration
€ 38.99 *
ggf. zzgl. Versand

Examining the benefits and practices of Continuous Integration (CI), this thorough manual discusses the benefits of CI in terms of software development and its applications in terms of improving software quality and reducing risk, using examples in Java and .NET that demonstrate the principles and practices of CI and offering suggestions on how to create an effective CI system, deal with potential pitfalls, and more. Original. (Intermediate)

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Incident Management for Operations
€ 23.99 *
ggf. zzgl. Versand

Aiming to help readers deliver high-performance, high reliability, process-oriented IT Operations, the author teaches users how to apply key IMS (Incident Management System) principles to IT operations, how to effectively manage risk, how to implement emergency-response teams and much more, in a book that features real-life case studies. Original.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Foundations of Information Security Based on IS...
€ 25.99 *
ggf. zzgl. Versand

This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers:- The quality requirements an organization may have for information; - The risks associated with these quality requirements;- The countermeasures that are necessary to mitigate these risks;- Ensuring business continuity in the event of a disaster;- When and whether to report incidents outside the organization. The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows:- Fundamental Principles of Security and Information security and Risk management. - Architecture, processes and information, needed for basic understanding of what information security is about. - Business Assets are discussed. - Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.) The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included. This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the ´real´ ISFS exam.

Anbieter: buecher.de
Stand: Dec 12, 2018
Zum Angebot
Making Enterprise Information Management (EIM) ...
€ 64.99 *
ggf. zzgl. Versand

Making Enterprise Information Management (EIM) Work for Business educates executives and middle management on the risks, challenges, and subsequent remediation value of treating information as a real asset. The book is divided into two parts, the first of which defines EIM, addresses why it is required, and identifies the business issues surrounding it. The second part acts as a field guide, or ´´how-to´´ that explains how EIM can be worked into any organization via various methodologies, techniques, templates, and business case studies.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Informationssicherheits-Management
€ 37.99 *
ggf. zzgl. Versand

Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch für die Prüfungsvorbereitung zum ´´Certified Information Security Manager (CISM)´´ nach ISACA. Nach einer Einleitung bereitet der erste Teil des Buches in vier Kapiteln auf das CISM-Examen vor. Diese wurden analog zur Struktur der ISACA - ´´Security Governance´´, ´´Risk Management´´, ´´Security Program Development and Management´´ und ´´Incident Response´´ - gegliedert. Der zweite Teil beschäftigt sich mit dem IT-Grundschutz-Standard des BSI und der Implementierung von Sicherheit anhand eines Baseline-Ansatzes. Der dritte und letzte Teil greift schließlich die vorab diskutierten Aspekte anhand von praktischen Beispielen auf und ergänzt sie durch aktuelle Themen, wie unter anderem das IT-Sicherheitsgesetz. Ein detaillierter Index und ein umfangreiches Glossar runden das Buch ab und machen es zudem zu einem Nachschlagewerk im Bereich des Informationssicherheits-Managements.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Software Security
€ 79.99 *
ggf. zzgl. Versand

This is the Mobipocket version of the print book. ´´When it comes to software security, the devil is in the details. This book tackles the details.´´ --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies ´´McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle.´´ --Howard A. Schmidt, Former White House Cyber Security Advisor ´´McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall.´´ --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in. This is the Mobipocket version of the print book. ´´When it comes to software security, the devil is in the details. This book tackles the details.´´ --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies ´´McGraw´s book shows you how to make the ´culture of security´ part of your development lifecycle.´´ --Howard A. Schmidt, Former White House Cyber Security Advisor ´´McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn´t), buy this book and post it up on the lunchroom wall.´´ --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book´s methods without radically changing the way you work. Inside you´ll find detailed explanations of * Risk management frameworks and processes * Code review using static analysis tools * Architectural risk analysis * Penetration testing * Security testing * Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot