28,95 €
28,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
14 °P sammeln
28,95 €
28,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
14 °P sammeln
Als Download kaufen
28,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
14 °P sammeln
Jetzt verschenken
28,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
14 °P sammeln
  • Format: PDF

Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same - but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility.Cyber security is much more than technologyMany books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known…mehr

Produktbeschreibung
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same - but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility.Cyber security is much more than technologyMany books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will still allow hackers to easily break into a system that has not taken account of these factors.CyberWar, CyberTerror, CyberCrime andCyberActivismencourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practices to create a culture of cybersecurity awareness within their organizations that complements their technology-based defences.A cyber aware workforce equals better securityThis second edition takes a deep look at the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organisational culture that is more robust and better able to deal with a wider range of threats. Related references, as well as recommendations for additional reading, are included at the end of each chapter making this a valuable resource for trainers, researchersand cybersecurity practitioners.Order this book today and see how international standards can boost your cyber defences

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.