Information Security: Opportunities and Limitations
Beschrijving
Bol
This book explains the most important technical terms and contents and assigns them to the corresponding areas. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed? Contents Fundamentals of Information Security Data Protection (Privacy) Functional Safety Information/Cybersecurity Standards Hacking Risk Assessment IT Service Management The Author Dr. Thomas Liedtke has many years of project and development experience in the areas of functional Safety, Security, and Data Protection in regulated environments. He is a lecturer, coach, and seminar leader for project management, processes, and methods as well as various maturity models. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. This book is a translation of an original German edition. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?
This book explains the most important technical terms and contents and assigns them to the corresponding areas. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed? Contents Fundamentals of Information Security Data Protection (Privacy) Functional Safety Information/Cybersecurity Standards Hacking Risk Assessment IT Service Management The Author Dr. Thomas Liedtke has many years of project and development experience in the areas of functional Safety, Security, and Data Protection in regulated environments. He is a lecturer, coach, and seminar leader for project management, processes, and methods as well as various maturity models. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content. This book is a translation of an original German edition. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?
AmazonPagina's: 224, Editie: 2024, Paperback, Springer
Prijshistorie
Prijzen voor het laatst bijgewerkt op: