Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

25.616 results (0,28414 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Security for Software Engineers

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments

The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments

Conducted properly information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets determination of current control vulnerabilities and appropriate safeguards selection. Performed incorrectly they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information capital and corporate value. Picking up where its bestselling predecessors left off The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently supplying wide-ranging coverage that includes security risk analysis mitigation and risk assessment reporting. The third edition has expanded coverage of essential topics such as threat analysis data gathering risk analysis and risk assessment methods and added coverage of new topics essential for current assessment projects (e. g. cloud security supply chain management and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment and it provides the tools methods and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies leading organizations and government agencies including the CIA NSA and NATO Douglas J. Landoll unveils the little-known tips tricks and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative technical and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method) including hundreds of tables over 70 new diagrams and figures and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk. com) provides downloads for checklists spreadsheets figures and tools. | The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments

GBP 59.99
1

Advancing Computational Intelligence Techniques for Security Systems Design

Security-First Compliance for Small Businesses

Security-First Compliance for Small Businesses

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions small businesses need to create cost-effective security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance ” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program. Looking at security and privacy through the lens of zero trust this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks this book offers insights into best practices based on the commonalities between regulations and industry standards highlighting some of the primary differences to show the nuances. Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create “cybersustainable” security-focused policies processes and controls that protect today’s future for tomorrow’s digital ecosystem. | Security-First Compliance for Small Businesses

GBP 44.99
1

Euro-Mediterranean Security A Search for Partnership

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services including what comprises good security practice. This second edition is fully updated to include new case scenarios threat vectors and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced sophisticated schemes. Security has always been a necessity for conducting business operations in both low- and high-risk situations regardless of the threat level in the operating environment. Overseas those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States people become targets because of positions held publicity politics economics or other issues that cause unwanted attention to a person their family or business operations. Security Operations Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. FEATURES • Identifies what can pose a threat how to recognize threats and where threats are most likely to be encountered • Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments especially in high-risk regions • Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view • Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them An equal help to those just entering the protection business or people and companies that are considering hiring a security detail Security Operations is a thorough detailed and responsible approach to this serious and often high-risk field. Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations threat assessment risk management client relations surveillance detection counter surveillance operations foot and vehicle movements and building security—blending solid operational theory with practical field experience. | Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

GBP 58.99
1

Euro-Mediterranean Security: A Search for Partnership A Search for Partnership

Cyber Security and Operations Management for Industry 4.0

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Strategic Security Forward Thinking for Successful Executives

Strategic Security Forward Thinking for Successful Executives

Strategic Security will help security managers and those aspiring to the position to think strategically about their job the culture of their workplace and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential—too often serving as firefighters rather than strategists. This book will help professionals consider their roles and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide recipes methods or guidelines to develop plans policies or procedures. However many do so without taking into account the personal element that is supposed to apply these methods. In this book the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming and serving as a quality effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate but because of its image security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved the strategic process is explained including the need to build the different steps into this process—and into the overarching business goals of the organisation—will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field. | Strategic Security Forward Thinking for Successful Executives

GBP 44.99
1

Trust Security and Privacy for Big Data

Trust Security and Privacy for Big Data

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT social platforms healthcare system logs bio-informatics etc. contribute to and define the ethos of Big Data which is volume velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT manufacturing smart cars power grids etc. but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges such as generative adversary networks efficient encryption and decryption algorithms encrypted information retrieval attribute-based encryption attacks on availability and reliability. Providing security and privacy for big data storage transmission and processing have been attracting much attention in all big data related areas. The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers academicians students and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT cyber physical domains big data architectures studies for trustworthy computing and approaches for distributed systems and big data security solutions etc. | Trust Security and Privacy for Big Data

GBP 145.00
1

Cryptographic and Information Security Approaches for Images and Videos

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1

Network Security

Network Security

First Published in 2002. Network Security: a practical guide provides a comprehensive review of network security issues with relevance to corporate networks fromboth an administrative and user perspective. It is particularly suited to IS executives administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization. The book covers a broad range of issues starting with an assessment of network security including the financial implications of security breaches and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness including system configuration acceptable use business continuity and explaining technical solutions available such as firewalls and content control. Introduction of a security policy is widely accepted as best practise in informing and educating users and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!*Discusses all the relevant issues with a concise straightforward and readily accessible approach. *Important emphasis placed on the people management aspects of network security. *Practical business oriented approach includes reference to legal and financial aspects of network security. *Companion web site at www. networksecurity. org. uk includes updates additional material downloads and links to resources and further information.

GBP 175.00
1

Strategic Security Management A Risk Assessment Guide for Decision Makers Second Edition

US National Security Reform Reassessing the National Security Act of 1947

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4. 0: Applications Challenges and Management presents new cyber-physical security findings for Industry 4. 0 using emerging technologies like artificial intelligence (with machine/deep learning) data mining applied mathematics. All these are the essential components for processing data recognizing patterns modeling new techniques and improving the advantages of data science. Features • Presents an integrated approach with Cyber-Physical Systems CPS security and Industry 4. 0 in one place • Exposes the necessity of security initiatives standards security policies and procedures in the context of industry 4. 0 • Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security • Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4. 0 This book is primarily aimed at graduates researchers and professionals working in the field of security. Executives concerned with security management knowledge dissemination information and policy development for data and network security in different educational government and non-government organizations will also find this book useful. | Intelligent Cyber-Physical Systems Security for Industry 4. 0 Applications Challenges and Management

GBP 110.00
1

Security Engineering for Embedded and Cyber-Physical Systems

Security Engineering for Embedded and Cyber-Physical Systems

Digital transformation also known as Industry 4. 0 Smart Industry and Smart Manufacturing is at the top of leaders’ agendas. Such a transformation stimulates innovation in new products and services the digital transformation of processes and the creation of new business models and ecosystems. In the world of manufacturing Industry 4. 0 is based on various technological advances among which we can mainly cite CPS (cyber-physical systems) IoT (Internet of Things) and IoS (internet of services). While engaging this fourth wave also brings significant challenges for manufacturers. Business operations and the supply chain are becoming more vulnerable to cyber threats. Security Engineering for Embedded and Cyber-Physical Systems is an invaluable resource to discover cybersecurity and privacy techniques for embedded and cyber-physical systems. This book presents the latest studies and research results on all aspects of security engineering for embedded and cyber-physical systems. It also provides a premier interdisciplinary reference for researchers practitioners and educators to discover the most recent innovations trends concerns and practical challenges encountered and solutions adopted in security engineering for embedded and cyber-physical systems. The book offers comprehensive coverage of the essential topics including the following: Embedded and cyber-physical systems threats and vulnerabilities Security engineering techniques for embedded and cyber-physical systems Security engineering for embedded and cyber-physical systems and potential future-use cases Artificial intelligence techniques for cybersecurity and privacy Security engineering for Internet of Things Blockchain for cybersecurity in embedded and cyber-physical systems This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in security engineering for embedded and cyber-physical systems. It aspires to provide a relevant reference for students researchers engineers and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances and future trends related to security engineering for embedded and cyber-physical systems.

GBP 105.00
1

Privacy and Security for Mobile Crowdsourcing

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Routledge Handbook of African Security