
Cybersecurity Technology and Governance
This book gives a complete introduction to cybersecurity and its many subdomains. Its unique by covering both technical and governance aspects of cybersecurity and iseasy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book''s......
For øyeblikket har vi ingen tilbud på dette produktet, men vi inviterer deg til å utforske lignende produkter som kan være av interesse.
Topplisten: Other Brand Data og informasjonsteknologi
Produktinformasjon
This book gives a complete introduction to cybersecurity and its many subdomains. Its unique by covering both technical and governance aspects of cybersecurity and iseasy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book''s website.The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed.The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.
Spesifikasjon
Produkt
Produktnavn | Cybersecurity Technology and Governance |
Merke | Other Brand |
Pris og prishistorikk
AI as a Service Serverless machine learning with AWSAlgorithmics Of Matching Under PreferencesMachine Learning for HealthcareEngineering Analysis with SOLIDWORKS Simulation 2024
Stakeholder Whispering Uncover What People Need Before Doing What They AskNetworking Essentials Companion Guide v3 Cisco Certified Support Technician (CCST) Networking 100150Secure IT Systems 29th Nordic Conference NordSec 2024 Karlstad Sweden November 6–7 2024 ProceedingsArtificial Intelligence and Soft Computing 23rd International Conference ICAISC 2024 Zakopane Poland June 16–20 2024 Proceedings Part III
Routing Projects & Techniques for the Small RouterIT Essentials Companion Guide v8Cybersecurity Technology and GovernanceOperating Systems (Pocket) Pent brukt bok uten markeringer
Principles of Digital Design (Innbundet) Pent brukt bok uten markeringerPro Apache Tomcat 6 (Pocket) Pent brukt bok uten markeringerThe rational unified process (Pocket) Pent brukt bok uten markeringerBalancing agility and discipline (Pocket) Pent brukt bok uten markeringer
Information and Communication Technologies (Pocket) Pent brukt bok uten markeringerThe Security Leader’s Communication Playbook Bridging the Gap between Security and the BusinessSearch Engine Optimization and Marketing A Recipe for Success in Digital MarketingArtificial Intelligence (Pocket) Pent brukt bok uten markeringer