Marknadens största urval
Snabb leverans

Böcker av Jason Edwards

Filter
Filter
Sortera efterSortera Populära
  • av Jason Edwards
    1 320,-

    Learn to enhance your organizations cybersecurity through the NIST Cybersecurity Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the frameworks functions in turn in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it promises to prove indispensable for the next generation of cybersecurity professionals. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find: Clear, jargon-free language for both beginning and advanced readersDetailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and RecoverHundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.

  • - Strategies, Technologies, and Best Practices
    av Jason Edwards
    720,-

    The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world.Understanding threats is just the start. The book also delves deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application.Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like A.I. and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready.What You Will Learn: The vast array of cyber threats, laying the groundwork for understanding the significance of cybersecurity.Various attack vectors, from malware and phishing to DDoS, giving readers a detailed understanding of potential threats.Delve into the psychological aspect of cyber threats, revealing how humans can be manipulated into compromising security.An in-depth look at how information is encrypted and decrypted to preserve its integrity and confidentiality.The essential techniques and technologies that safeguard data while it's being transferred across networks.Strategies and methods to protect online applications from threats.How to safeguard data and devices in an increasingly mobile-first world.Demystify the complexities of cloud environments, offering tools and strategies to ensure data safety.The science behind investigating and analyzing cybercrimes post-incident.How to assess system vulnerabilities and how ethical hacking can identifyweaknesses.Who this book is for: CISOs, Learners, Educators, Professionals, Executives, Auditors, Boards of Directors, and more.

  • av Jason Edwards
    1 220,-

    Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity--and increasing key risk factors at the same time--and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance readers will also find: Over 1300 actionable recommendations found after each section Detailed discussion of topics including AI, cloud, and quantum computing More than 70 ready-to-use KPIs and KRIs "This guide's coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical." -- Gary McAlum, CISO. "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)." -- Wil Bennett, CISO

  • av Jason Edwards
    606,-

  • - Eve Kosofsky Sedgwick as a Poet
    av Jason Edwards
    346,-

  • - Gilbert Amongst Whistler, Wilde, Leighton, Pater and Burne-Jones
    av Jason Edwards
    650 - 2 106,-

    Alfred Gilbert's "Aestheticism" presents the re-evaluation of the life and work of one of the most acclaimed sculptors of the late-Victorian period. This study challenges the customary assumption that Aestheticism was a literary, painterly or architectural phenomena. It presents over 80 illustrations, including photographs showing Gilbert's works.

  • av Jason Edwards, Ned Riaz & Rich Babaran
    846,-

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.