Muutke küpsiste eelistusi

E-raamat: True Cost of Information Security Breaches and Cyber Crime

  • Formaat: 73 pages
  • Ilmumisaeg: 16-Jul-2013
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781849284974
  • Formaat - EPUB+DRM
  • Hind: 11,64 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 73 pages
  • Ilmumisaeg: 16-Jul-2013
  • Kirjastus: IT Governance Publishing
  • Keel: eng
  • ISBN-13: 9781849284974

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.



This pocket guide uses case studies to illustrate the possible security breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.

Muu info

Essential advice on developing a cyber security system that is right for your organisation.
Introduction 1(2)
Chapter 1 The Daily Breach
3(6)
Chapter 2 Information Security and Business Risk
9(12)
Chapter 3 Cost Factors of a Breach
21(16)
Chapter 4 Case Studies
37(22)
Chapter 5 A Brief Checklist
59(4)
Chapter 6 Conclusion
63(2)
ITG Resources 65
Michael Krausz studied Physics, Computer Science and Law at the University of Technology, Vienna University and Webster University. In order to combine his two main hobbies, computers and investigations, he chose to become a professional investigator and IT expert. Over the course of his career he has investigated over a hundred cases of information security breaches, usually connected with white-collar crime. Michael Krausz is an ISO 27001 auditor and has delivered over 5000 hours of professional and academic training. He has provided consulting or investigation services in 12 countries to date.





John Walker has over 30 years experience in the world of IT, and Cyber Security, is a Visiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [ to 2015], CTO of SBLTD, and holds the position as a Board Director of Cyber Research at the Ascot Barclay Group. John is an Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), a Fellow of the British Computer Society (BCS), and is a Member of the Editorial Board at the Executive Risk Magazine [ ERM].