Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Cloud computing 30
- Ubach, Bonaventura 29
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
121
-
122
-
123
-
124por Subirachs, Josep Maria, 1927-2014Materias: “…Subirachs, Josep Maria 1927-2014 Exposiciones…”
Publicado 2003
Libro -
125
-
126
-
127
-
128
-
129
-
130
-
131Publicado 2016Tabla de Contenidos: “…An overview of data breaches -- Preparing to develop a computer security incident response plan -- Developing a computer security incident response plan -- Qualifying and investigating a breach -- Containing a breach -- Precisely determining the scope of a breach -- Communicating before, during and after a breach -- Restoring trust and business services after breach -- Preparing for data breach litigation…”
Libro electrónico -
132Publicado 2015“…The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is the norm in 2015: vulnerabilities have been experienced across all operating systems, millions of individuals have been affected by data breaches, and countless well-known companies have fallen victim to cyber attacks. …”
Libro electrónico -
133
-
134por Krausz, Michael“…This book provides a general discussion of, and a source of learning about, what information security breaches are, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. …”
Publicado 2010
Libro electrónico -
135por Simmons, Andrea C.“…Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major security breach could spell disaster. The buck stops with you. …”
Publicado 2012
Libro electrónico -
136
-
137
-
138
-
139
-
140