Your Search Results
-
Promoted Content
-
Computer security
CyberWar, CyberTerror, CyberCrime and CyberActivism
An in-depth guide to the role of standards in the cybersecurity environment
by Julie E Mehan
Develop better cybersecurity by taking a wider view of the threats Many books on cybersecurity focus on technical responses to the cybercriminal, the cyberactivist and the state-sponsored hacker. As important as this is, relatively inexperienced hackers can still break into systems that have not taken account of human fallibility and other known vulnerabilities. Cyber security is much more than technology CyberWar, CyberTerror, CyberCrime and CyberActivism encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defences. This second edition analyses the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and create a cyber-aware organisational culture that is more robust and better able to deal with a wider range of threats. About the author Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cybersecurity and related privacy services to senior commercial, department of defence and federal government clients working in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is also an Associate Professor at the University of Maryland University College, specializing in courses in Cybersecurity, Cyberterror, IT in Organizations and Ethics in an Internet Society.
-
Children's & YAJune 2020
CRIMES AND PUNISHMENTS
by Severino Rodrigues, Regina Drummond, Flávia Cortês, Luis Eduardo Matta, Shirley Souza, Luís Dill, Rosana Rios
Great Russian author, Fyodor Dostoyevsky, wrote a wonderful novel about guilt, taking responsibility and human weakness. Crimes and punishments is a tribute to that literary genius, in which seven authors discuss some very delicate and very contemporary problems. It could happen to any one of us.
-
Fantasy
Lyre
by Helen Harper
Yuri, a half Japanese-half English girl, has struggled ever since her beloved father drowned when she was a child. The circumstances of his death were anything but natural - he was drawn into a storm by the sensual singing of a group of sirens and Yuri's life has been overshadowed by the threat of the gods of Olympus ever since. However, when she meets Ozzy, a soulful singer who goes on to become one of the country's biggest rockstars, she attempts to put her past behind her. Unfortunately, fate has not finished messing with her just yet. The second book in the Olympiana series, although able to be read as a stand-alone, Lyre follows the classic tale of Orpheus and Eurydice.
-
Computer securityMarch 2010
Assessing Information Security
Strategies, Tactics, Logic and Framework
by Andrew A. Vladimirov
What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.
-
Computer security
Security Testing Handbook for Banking Applications
by Arvind Doraiswamy, Sangita Pakala, Nilesh Kapoor, Prashant Verma, Praveen Singh, Raghu Nair and Shalini Gupta
Address human vulnerabilities with this essential guide … Practical advice from an acknowledged expert – endorsed by BT! Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back £400, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands. The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness. Improve information security Improving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them. BT’s approach This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
-
Children's & YAMarch 2023
Biomes of the World
by Juliana Aschwanden-Vilaça
What would our maps look like if the boundaries weredrawn by nature? The simplest way to divide theearth's surface is by biomes. In this way, 14 differentterrestrial habitats can be described, defined by theirfauna and flora, their geological makeup and theirclimate. The artist and environmental manager JulianaAschwanden-Vilaҫa has created a book that presentsthese biomes with impressive illustrations. In doing so,she opens our eyes to the fragility of the world.The artfully designed non-fiction book is suitable forchildren aged 10 and up and makes a great gift!
-
Business, Economics & LawFebruary 2019
The Resilience Toolkit
Powerful ways to thrive in blue-light services
by Jonathan Rees
Today’s workplace is fast-paced, highly complex, and sometimes even life-threatening. Yet it is possible to thrive in the ‘pressure cooker’ of modern work life. We all have the right to enjoy rather than just endure work. In the unpredictability of even the most challenging environments, the route to success and fulfilment at work is to build our resilience. This ground-breaking book provides a highly effective toolkit that will empower you to survive, thrive and flourish in the dynamic and fast-changing context of blue-light services. Discover how to: Be ready for the unexpected, feel calm and confident under pressure and avoid burnout Reduce stress and anxiety by understanding the essential components of a resilient work life Evaluate your own resilience factor with the Workplace Resilience Instrument
-
Fiction
Simon & Schuster Australia
by Books From Australia
Simon & Schuster Australia is part of the CBS Corporation and is a major force in today’s publishing industry, dedicated to bringing an extensive range of books, in all formats, into the hands of readers. Simon & Schuster Australia publishes and distributes a variety of books in Australia and New Zealand across a range of genres including fiction, non-fiction and children’s books under our local and international imprints. These include Atria, Free Press, Gallery, Howard, Pocket, Scribner, Simon & Schuster and Touchstone. Simon & Schuster Australia also acts as the local sales and distribution partner for: 4 Ingredients, Berbay Publishing, Big Sky Publishing, Black Library, Cider Mill Press, Elliott & Thompson, Fox Chapel Publishing International, Gallup Press, Hazelden, Hunter Publishers, Inner Traditions, Insight Editions, Manuscript Publishing, Pegasus Books, Printers Row, Regan Arts, Rockpool Publishing, Smith Street Books, Ventura Press, Viz Media, Waterhouse Press, Weldon Owen and Wild Dog Books.