1.

Record Nr.

UNINA990005668760403321

Autore

Semprini, Giovanni

Titolo

La filosofia di Pico della Mirandola / Giovanni Semprini ; in appendice la lettera a Ermolao Barbaro e l'"Orazione sulla dignità dell'uomo"

Pubbl/distr/stampa

Milano, : Libreria Lombarda, 1936

Descrizione fisica

283 p. ; 22 cm

Disciplina

195

Locazione

FLFBC

Collocazione

P.1 FG 2069

5/IX F 24

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910819018503321

Autore

Reuvid Jonathan

Titolo

Managing cybersecurity risk : case studies and solution / / Jonathan Reuvid

Pubbl/distr/stampa

London : , : Legend Press, , [2018]

©2018

ISBN

1-78719-890-1

Edizione

[2nd ed.]

Descrizione fisica

1 online resource (211 pages)

Disciplina

658.478

Soggetti

Business enterprises - Computer networks - Security measures

Computer crimes - Prevention

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Cover -- Title -- Copyright -- Contents -- Foreword -- Preface -- List of Contributors -- Introduction -- Part One Cybersecurity in the



Information Age -- 1.1 Building Business Resilience -- 1.2 Enterprise Vulnerablity Scanning -- 1.3 Cybercrime - Translating the Tech from the Floor to the Boardroom -- 1.4 Cybersecurity: Moving from Awareness to Understanding -- 1.5 How Cyber Criminals Make Money -- 1.6 If SMEs are the Life Blood of the British Economy, We've Cut an Artery -- Part Two Addressing the Management Issues -- 2.1 Managing Cyber Risk - The Role of the Board -- 2.2 Activating the Human Firewall -The Leap from Knowing to Doing -- 2.3 The Resilient Organisation - Are We Searching for Our "Phlogiston"? -- 2.4 An Action Plan for Response and Damage Containment -- 2.5 Addressing the Skills Shortage in Cybersecurity -- Part Three General Data Protection Regulation -- 3.1 GDPR - A View from the Frontline -- 3.2 GDPR - Introducing the UK Regime -- 3.3 Using Scenario Workshops to Prepare for GDPR and Other Legislation -- 3.4 GDPR - Comparative International Regimes -- 3.5 Intrusion Detection System Evaluation Guide -- Part Four Innovative Tools for Cyber Threat Response -- 4.1 Identifying Affordable and Cost-effective Solutions -- 4.2 Detecting Ransomware with Unified Security -- 4.3 Petya Ransomwware Rapid Response Guide -- 4.4 The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World -- Part Five Cautionary Tales from the Frontline -- 5.1 The Power of Storytelling -- 5.2 How to Avoid That 'I Told You So' Moment -- 5.3 A Cuckoo in the Nest? -- 5.4 The Trouble with Contractors -- 5.5 Hacked into a Parallel Universe -- Contributors' Contacts.

Sommario/riassunto

This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.