Inicio > > Seguridad informática > Effective Cybersecurity Operations for Enterprise-Wide Systems
Effective Cybersecurity Operations for Enterprise-Wide Systems

Effective Cybersecurity Operations for Enterprise-Wide Systems

 

248,86 €
IVA incluido
Disponible
Editorial:
IGI Global
Año de edición:
2023
Materia
Seguridad informática
ISBN:
9781668490198
248,86 €
IVA incluido
Disponible
Añadir a favoritos

Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of 'smart' devices, which constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Its primary goal is to ensure the dependability, integrity, and data privacy of enterprise-wide systems in an era of increasing cyberattacks from around the world. Effective Cybersecurity Operations for Enterprise-Wide Systems examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many publications do not include an enterprise-wide perspective of the research. The book provides such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others. Covering topics including cybersecurity in international business, risk management, artificial intelligence, social engineering, spyware, decision support systems, encryption, cyber-attacks and breaches, ethical hacking, transaction support systems, phishing, and data privacy, it is designed for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Artículos relacionados

  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
    Disponible

    125,53 €

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
    Disponible

    268,95 €

  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
    Disponible

    118,53 €

  • Software Asset Management Maturity Assessment
    Elizabeth Sherwin / Terry Green
    The Software Asset Management (SAM) practitioner’s guide is designed to provide the IT professional with the required information to undertake a SAM maturity assessment against the International Standard (ISO/IEC 19770-1:2012) for Software Asset Management. This maturity assessment approach is based on the Australian Software Asset Management Association’s (ASAMA) SAM Maturity ...
    Disponible

    170,26 €

  • Management Information Systems
    Sarita Hardin-Ramanan / Theodora Issa / Tomayess Issa
    ...
    Disponible

    100,98 €

  • Performing Security Analyses of Information Systems
    Sr. Charles L. Smith / SrCharles LSmith
    In the aftermath of the 9/11 terrorist attacks, responsible organizations are now even more interested in identifying their specific needs forinformation system security. This book provides a structured process for assisting any analyst in performing this task. ...
    Disponible

    47,35 €