Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 2
- Security measures 2
- Artificial intelligence 1
- Certification 1
- Computer security 1
- Data processing 1
- Data protection 1
- Electronic data processing personnel 1
- Examinations 1
- Government policy 1
- Industrial applications 1
- Management 1
- National security 1
- Political aspects 1
- Reliability (Engineering) 1
- System analysis 1
-
1Publicado 2019Tabla de Contenidos:Libro electrónico
-
2Publicado 2023Tabla de Contenidos: “…Divestitures -- Third Party Assessment and Monitoring -- Outsourcing and Offshoring -- Types of Attackers -- Hackers -- Script Kiddies -- Outsiders -- Insiders -- Hacktivist -- Bots and Botnets -- Phishers and Spear Phishers -- Summary of Exam Objectives -- Self-Test -- Self-Test Quick Answer Key -- References -- Chapter 3: Domain 2: Asset Security -- Unique Terms and Definitions -- Introduction -- Classifying Data -- Labels -- Security Compartments -- Clearance -- Formal Access Approval -- Need to Know -- Sensitive Information/Media Security -- Sensitive Information -- Handling -- Storage -- Retention -- Ownership and Inventory -- Asset Inventory -- Asset Retention -- Business or Mission Owners -- Data Owners -- System Owner -- Custodian -- Users -- Data Controllers and Data Processors -- Data Location -- Data Maintenance -- Data Loss Prevention -- Digital Rights Management -- Cloud Access Security Brokers -- Data Collection Limitation -- Memory and Remanence -- Data Remanence -- Memory -- Cache Memory -- RAM and ROM -- DRAM and SRAM -- Firmware -- Flash Memory -- Solid State Drives (SSDs) -- Data Destruction -- Overwriting -- Degaussing -- Destruction -- Shredding -- Determining Data Security Controls -- Certification and Accreditation -- Standards and Control Frameworks -- Standards Selection -- PCI-DSS -- OCTAVE -- ISO 17799 and the ISO 27000 Series -- COBIT -- ITIL -- Scoping and Tailoring -- Data States -- Protecting Data in Use -- Protecting Data in Transit -- Drive and Tape Encryption -- Media Storage and Transportation -- Summary of Exam Objectives -- Self-Test -- Self-Test Quick Answer Key -- References -- Chapter 4: Domain 3: Security Architecture and Engineering -- Unique Terms and Definitions -- Introduction -- Secure Design Principles -- Threat Modeling -- Least Privilege and Defense-in-Depth -- Secure Defaults -- Privacy by Design…”
Libro electrónico -
3Publicado 2021Tabla de Contenidos: “…-- A Successful Project -- The CEO Meeting -- Grokking the Business -- The Company's Gestalt -- Values, Vision, Mission -- Business Model and Health -- History -- Why, Who, and How? …”
Libro electrónico -
4por Whitlock, Chris“…As the Honorable Robert Work wrote in the foreword: “This book is not the last word on leading AI in the national security enterprise, but I believe it is an essential starting point.” You will: • Review axioms or enduring truths at work in six dimensions of AI: program, budget, project, data science, people, and technology • Apply best practices—such as decision frameworks, processes, checklists—for leading work in each of the six dimensions. • See how the axioms and best practices are contextualized to national security missions…”
Publicado 2023
Libro electrónico