Foundations of information security

Pro vyhledávací frázi Foundations of information security jsme na našem vyhledávači našli 783 výsledků. Nenašli jste přesně to, co jste hledali? Zkuste frázi Foundations of information security trochu pozměnit a opět zadat do vyhledávacího pole. Pevně věříme, že produkt, který hledáte v naší nabídce na srovnávači CoChceš.cz naleznete!

Nalezeno 783 produktů

Foundations Of Information Security

A comprehensive overview of the information security field.

Více informací
Dostupnost: do 7 dnů

Foundations of Library and Information Science

In the fifth edition of this classic textbook, Richard E. Rubin and new co-author Rachel G. Rubin provide a foundational text for LIS students and pro

Více informací
Dostupnost: do 7 dnů

Network Security and Cryptography

The definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as

Více informací
Dostupnost: do 7 dnů

Information Security Management

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life

Více informací
Dostupnost: do 7 dnů

Information Security Governance

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any secu

Více informací
Dostupnost: do 7 dnů

Crafting an Information Security Playbook

Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an Inf

Více informací
Dostupnost: do 7 dnů

Information Security Risk Assessment Toolkit

Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you t

Více informací
Dostupnost: do 7 dnů

Information Technology Security and Risk Management

Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developmen

Více informací
Dostupnost: do 7 dnů

Foundations of Manual Lymph Drainage

Covering the anatomy, physiology, and pathophysiology of the lymphatic system, this guide provides the information necessary for effective treatment.

Více informací
Dostupnost: do 7 dnů

Cloud Computing Basics

Highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud comp

Více informací
Dostupnost: do 7 dnů

Cybersecurity for Information Professionals

The book is an introduction to essential concepts of cybersecurity and information security and the methods and techniques used to combat cybersecurit

Více informací
Dostupnost: do 7 dnů

Introduction to Machine Learning with Applications in Information Security

This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information

Více informací
Dostupnost: do 7 dnů

Information Security Education - Adapting to the Fourth Industrial Revolution

This book constitutes the refereed proceedings of the 15th IFIP WG 11.8 World Conference on Information Security Education, WISE 2022, held in Copenha

Více informací
Dostupnost: do 7 dnů

Sound Foundations Pack New Edition

Sound Foundations is an ideal introduction to the English phonological system and an invaluable resource both for teachers of full pronunciation courses and for those who sould ismply like to improve the quality of their work on pronunciation. It offers information on pronunciation systems as well as practical activities which can be used in pronunciation classes and in r...

Více informací
Dostupnost: do 2 dnů

Safety and Security at Sea

Concerned with the safe operation of ships and preventing errors and oversights, this book provides information on safety where it is most effective -

Více informací
Dostupnost: do 7 dnů

Art of Deception

Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will

Více informací
Dostupnost: do 7 dnů

Shadows of Doubt (PC)

Early Access GameNote: This Early Access game is not complete and may or may not change further.A procedurally-generated sandbox stealth game with a whole city of secrets at your fingertips!Shadows of Doubt is set in an alternate reality in the hyper-industrialized 1980s. Think like a detective and use a variety of gadgets as a private intelligence investigator, ...

Více informací
Dostupnost: skladem

Shadows of Doubt

Early Access Game Note: This Early Access game is not complete and may or may not change further. A procedurally-generated sandbox stealth game with a whole city of secrets at your fingertips! Shadows of Doubt is set in an alternate reality in the hyper-industrialized 1980s. Think like a detective and use a variety of gadgets as a private intelligence investigator, g...

Více informací
Dostupnost: skladem

Evolution of Business in the Cyber Age

The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the d

Více informací
Dostupnost: do 7 dnů

The Inmate: From the Sunday Times Bestselling Author of The Housemaid - McFadden Freida

Anotace: A gripping, twisty thriller from Freida McFadden, the New York Times author of The Housemaid and The Coworker!The guiltiest people aren`t always the ones behind bars...As a new nurse practitioner at a maximum-security prison, Brooke Sullivan is taught three crucial rules: Treat all prisoners with respect.Never reveal any personal information. Never EVER become t...

Více informací
Dostupnost: do 7 dnů

The Inmate: From the Sunday Times Bestselling Author of The Housemaid - Freida McFadden

<p>A gripping, twisty thriller from Freida McFadden, the New York Times author of The Housemaid and The Coworker!The guiltiest people aren't always the ones behind bars...As a new nurse practitioner at a maximum-security prison, Brooke Sullivan is taught three crucial rules: Treat all prisoners with respect.Never reveal any personal information. Never EVER become to...

Více informací
Dostupnost: do 4 dnů

BS ISO/IEC 27014:2013 31.5.2013

Platná norma BS ISO/IEC 27014:2013 Information technology. Security techniques. Governance of information security.

Více informací
Dostupnost: skladem

BS 7799-1:1999 15.5.1999

Neplatná norma BS 7799-1:1999 Information security management. Code of practice for information security management.

Více informací
Dostupnost: do 2 dnů

BS 7799UserDesktopVersion(A5PK5):1999 15.5.1999

Neplatná norma BS 7799UserDesktopVersion(A5PK5):1999 Information security management. Code of practice for information security management.

Více informací
Dostupnost: do 2 dnů

Long-Term Psychodynamic Psychotherapy

This edition offers research on the foundations, techniques, and efficacy of psychodynamic psychotherapy, while still providing the information on ass

Více informací
Dostupnost: do 7 dnů

GOST R ISO/IEC 27003-2012 1.12.2013

Platná norma GOST R ISO/IEC 27003-2012 Information technology. Security techniques. Information security management systems. Implementation guidance of information security management system

Více informací
Dostupnost: skladem

ISO/IEC 27002-ed.2.0 25.9.2013

Platná norma ISO/IEC 27002-ed.2.0 Information technology -- Security techniques -- Code of practice for information security controls

Více informací
Dostupnost: skladem

ISO/IEC 27014-ed.1.0 23.4.2013

Platná norma ISO/IEC 27014-ed.1.0 Information technology -- Security techniques -- Governance of information security

Více informací
Dostupnost: skladem

BS ISO/IEC 17799GERMANTRANS. 1.1.1900

Platná norma BS ISO/IEC 17799GERMANTRANS. Information technology. Security techniques. Code of practice for information security management.

Více informací
Dostupnost: skladem

BS 7799-1:1995 15.2.1995

Neplatná norma BS 7799-1:1995 Information security management. Code of practice for information security management systems.

Více informací
Dostupnost: do 2 dnů

GOST R ISO/IEC 27002-2012 1.1.2014

Platná norma GOST R ISO/IEC 27002-2012 Information technology. Security techniques. Code of practice for information security management

Více informací
Dostupnost: skladem

GOST 7.81-2001 1.7.2002

Platná norma GOST 7.81-2001 System of standards on information, librarianship and publishing. Statistical registration of non-periodical and periodical publications. Main foundations

Více informací
Dostupnost: skladem

ISO/IEC 27036-4-ed.1.0 28.9.2016

Platná norma ISO/IEC 27036-4-ed.1.0 Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services

Více informací
Dostupnost: skladem

BS ISO/IEC 27036-4:2016 31.10.2016

Platná norma BS ISO/IEC 27036-4:2016 Information technology. Security techniques. Information security for supplier relationships. Guidelines for security of cloud services.

Více informací
Dostupnost: skladem

GOST R 53109-2008 1.10.2009

Platná norma GOST R 53109-2008 Information security of the public communications network providing system. Passport of the organization communications of information security

Více informací
Dostupnost: skladem

GOST R 56838-2015 1.11.2016

Platná norma GOST R 56838-2015 Health informatics. Information security management for remote maintenance of medical devices and systems. Part 2. Implementation of an information security management system

Více informací
Dostupnost: skladem

ETSI GS ISI 003-V1.1.1 13.5.2014

Platná norma ETSI GS ISI 003-V1.1.1 Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) for the evaluation of maturity detection of security events

Více informací
Dostupnost: skladem

ISO/IEC/TR 19791-ed.2.0 22.3.2010

Platná norma ISO/IEC/TR 19791-ed.2.0 Information technology -- Security techniques -- Security assessment of operational systems

Více informací
Dostupnost: skladem

ISO/IEC 19792-ed.1.0 30.7.2009

Platná norma ISO/IEC 19792-ed.1.0 Information technology -- Security techniques -- Security evaluation of biometrics

Více informací
Dostupnost: skladem

GOST R ISO/IEC TR 19791-2008 1.10.2009

Platná norma GOST R ISO/IEC TR 19791-2008 Information technology. Security techniques. Security assessment of operational systems

Více informací
Dostupnost: skladem

UNE-ISO/IECTR 19791:2013IN 30.4.2013

Platná norma UNE-ISO/IECTR 19791:2013IN INFORMATION TECHNOLOGY. SECURITY TECHNIQUES. SECURITY ASSESSMENT OF OPERATIONAL SYSTEMS

Více informací
Dostupnost: skladem

GOST R 57628-2017 1.1.2018

Platná norma GOST R 57628-2017 Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets

Více informací
Dostupnost: skladem

GOST R ISO/IEC 17799-2005 1.1.2007

Neplatná norma GOST R ISO/IEC 17799-2005 Information technology. Code of practice for information security management

Více informací
Dostupnost: skladem

R 50.1.111-2016 1.6.2017

Platná norma R 50.1.111-2016 Information technology. Cryptographic data security. Password-based protection of key information

Více informací
Dostupnost: skladem

GOST R 53114-2008 1.10.2009

Platná norma GOST R 53114-2008 Protection of information. Information security provision in organizations. Basic terms and definitions

Více informací
Dostupnost: skladem

BS ISO/IEC 13335-1:2004 13.12.2004

Neplatná norma BS ISO/IEC 13335-1:2004 Information technology. Security techniques. Management of information and communications technology security. Concepts and models for information and communications technology security management.

Více informací
Dostupnost: do 2 dnů

DIN ISO/IEC 13335-1:2006-11 1.11.2006

Neplatná norma DIN ISO/IEC 13335-1:2006-11 Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management.

Více informací
Dostupnost: skladem

ETSI GS ISI 008-V1.1.1 22.6.2018

Platná norma ETSI GS ISI 008-V1.1.1 Information Security Indicators (ISI); Description of an Overall Organization-wide Security Information and Event Management (SIEM) Approach

Více informací
Dostupnost: skladem

ISO/IEC 27002-ed.2.0/Cor.2 6.11.2015

Platná norma ISO/IEC 27002-ed.2.0/Cor.2 Corrigendum 2 - Information technology -- Security techniques -- Code of practice for information security controls

Více informací
Dostupnost: skladem

ISO/IEC 27006-ed.3.0 30.9.2015

Platná norma ISO/IEC 27006-ed.3.0 Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems

Více informací
Dostupnost: skladem

ISO/IEC/TS 27008-ed.1.0 14.1.2019

Platná norma ISO/IEC/TS 27008-ed.1.0 Information technology - Security techniques - Guidelines for the assessment of information security controls

Více informací
Dostupnost: skladem

ISO/IEC 27035-1-ed.1.0 28.10.2016

Platná norma ISO/IEC 27035-1-ed.1.0 Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management

Více informací
Dostupnost: skladem
1 2 3 4 5 6 7 ... 14
Používáme cookies, abychom mohli provozovat tuto internetovou stránku a zlepšit Vaši uživatelskou spokojenost. Budete-li pokračovat beze změny nastavení, předpokládáme, že souhlasíte s ukládáním souborů cookies z internetových stránek. Více informací o použití cookies.
OK