Adaptive security management architecture / / James S. Tiller
| Adaptive security management architecture / / James S. Tiller |
| Autore | Tiller James S. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton [Fla.] : , : Auerback Publications : , : CRC Press, , 2011 |
| Descrizione fisica | 1 online resource (484 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Computer security |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-000-65444-3
0-367-45229-4 0-429-11909-7 1-4200-1337-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front cover; Contents; List of Illustrations; List of Tables; Foreword; Acknowledgments; About the Author; Chapter 1. Introduction; Chapter 2. Security and Business; Chapter 3. Achieving Adaptability; Chapter 4. Defining Security Services; Chapter 5. Services Management; Chapter 6. Risk Management; Chapter 7. Compliance Management; Chapter 8. Governance; Chapter 9. Organizational Management; Chapter 10. Capability Maturity Management; Chapter 11. Conclusion; Index; Back cover |
| Record Nr. | UNINA-9910459471203321 |
Tiller James S.
|
||
| Boca Raton [Fla.] : , : Auerback Publications : , : CRC Press, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Adaptive security management architecture / / James S. Tiller
| Adaptive security management architecture / / James S. Tiller |
| Autore | Tiller James S. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton [Fla.] : , : Auerback Publications : , : CRC Press, , 2011 |
| Descrizione fisica | 1 online resource (484 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Computer security |
| ISBN |
1-000-65444-3
0-367-45229-4 0-429-11909-7 1-4200-1337-8 |
| Classificazione | COM053000COM032000BUS073000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front cover; Contents; List of Illustrations; List of Tables; Foreword; Acknowledgments; About the Author; Chapter 1. Introduction; Chapter 2. Security and Business; Chapter 3. Achieving Adaptability; Chapter 4. Defining Security Services; Chapter 5. Services Management; Chapter 6. Risk Management; Chapter 7. Compliance Management; Chapter 8. Governance; Chapter 9. Organizational Management; Chapter 10. Capability Maturity Management; Chapter 11. Conclusion; Index; Back cover |
| Record Nr. | UNINA-9910785330403321 |
Tiller James S.
|
||
| Boca Raton [Fla.] : , : Auerback Publications : , : CRC Press, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Asset protection through security awareness / / Tyler Justin Speed
| Asset protection through security awareness / / Tyler Justin Speed |
| Autore | Speed Tyler Justin |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (520 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Information technology - Security measures Business enterprises - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-367-38181-8
0-429-09346-2 1-4665-5141-0 1-283-59642-3 9786613908872 1-4398-0983-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; INTRODUCTION; WHAT IS INFORMATION SECURITY?; CHAPTER 1: CREATING A CULTURE OF SECURITY AWARENESS; CHAPTER 2: OVERVIEW OF SECURITY AWARENESS CATEGORIES; CHAPTER 3: WHO IS AN IS PROFESSIONAL?; CHAPTER 4: DIPLOMACY; CHAPTER 5: PRIVACY CONCERNS; CHAPTER 6: INTERDEPARTMENTAL SECURITY; CHAPTER 7: RISK MANAGEMENT; CHAPTER 8: SOCIAL ENGINEERING; CHAPTER 9: INCIDENT DETECTION AND RESPONSE; CHAPTER 10: PHYSICAL SECURITY; CHAPTER 11: PCI COMPLIANCE; CHAPTER 12: BUSINESS CONTINUITY PLANNING; CHAPTER 13: USER AUTHENTICATION METHODS
CHAPTER 14: COMPUTER AND NETWORK FORENSICSCHAPTER 15: MALWARE; CHAPTER 16: CRAFTING A SECURITY POLICY; CHAPTER 17: PERFORMING SECURITY ANALYSES AND AUDITS; CHAPTER 18: ACCESS CONTROL; CHAPTER 19: SECURITY CHECKLISTS; INDEX; ABOUT THE AUTHOR |
| Record Nr. | UNINA-9910457879103321 |
Speed Tyler Justin
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Asset protection through security awareness / / Tyler Justin Speed
| Asset protection through security awareness / / Tyler Justin Speed |
| Autore | Speed Tyler Justin |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2012 |
| Descrizione fisica | 1 online resource (520 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer networks - Security measures
Information technology - Security measures Business enterprises - Security measures |
| ISBN |
0-367-38181-8
0-429-09346-2 1-4665-5141-0 1-283-59642-3 9786613908872 1-4398-0983-6 |
| Classificazione | BUS073000COM032000COM053000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; INTRODUCTION; WHAT IS INFORMATION SECURITY?; CHAPTER 1: CREATING A CULTURE OF SECURITY AWARENESS; CHAPTER 2: OVERVIEW OF SECURITY AWARENESS CATEGORIES; CHAPTER 3: WHO IS AN IS PROFESSIONAL?; CHAPTER 4: DIPLOMACY; CHAPTER 5: PRIVACY CONCERNS; CHAPTER 6: INTERDEPARTMENTAL SECURITY; CHAPTER 7: RISK MANAGEMENT; CHAPTER 8: SOCIAL ENGINEERING; CHAPTER 9: INCIDENT DETECTION AND RESPONSE; CHAPTER 10: PHYSICAL SECURITY; CHAPTER 11: PCI COMPLIANCE; CHAPTER 12: BUSINESS CONTINUITY PLANNING; CHAPTER 13: USER AUTHENTICATION METHODS
CHAPTER 14: COMPUTER AND NETWORK FORENSICSCHAPTER 15: MALWARE; CHAPTER 16: CRAFTING A SECURITY POLICY; CHAPTER 17: PERFORMING SECURITY ANALYSES AND AUDITS; CHAPTER 18: ACCESS CONTROL; CHAPTER 19: SECURITY CHECKLISTS; INDEX; ABOUT THE AUTHOR |
| Record Nr. | UNINA-9910781524603321 |
Speed Tyler Justin
|
||
| Boca Raton, Fla. : , : CRC Press, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Behind the AI Mask : Protecting Your Business from Deepfakes
| Behind the AI Mask : Protecting Your Business from Deepfakes |
| Autore | Bogan Carl |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (164 pages) |
| Disciplina | 658.4/78 |
| Soggetto topico | Deepfakes |
| ISBN |
1-394-33729-9
1-394-33728-0 1-394-35261-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Introduction: The Deepfake Dilemma -- Chapter 1 The Birth of Myster Giraffe: The Spark That Lit the Fire -- The VFX Artist Behind the Mask -- The Super Deepfake Squad -- The Giraffe Who Knew Too Much -- Real-Time Deepfakes: The Turning Point -- Trust Experiments: The Kevin Calls -- Audience Reactions and Social Media Psychology -- Cancel Culture's Impact on Deepfake Comedy -- The Ethics of Viral Manipulation -- Lessons from Going Viral -- What's Next? -- Chapter 2 Very Brief History of Synthetic Media -- The Analog Era (1870s-1980s): The First Deceptions -- The Dawn of Digital (1980s-2000s): The Democratization Begins -- The Deep Learning Revolution (2000s-2017): When Machines Learned to See -- The Viral Era (2018-2023): When Business Met Deception -- The Industrial Era (2023-Current): The New Normal -- Conclusion: The Eternal Return -- What's Next? -- Chapter 3 The Double-Edged Sword: Illuminating the Duality -- The Promise of Light -- Restoring What Was Lost -- The Ones We Know -- The Torajan Reminder -- What They'll Say with My Voice -- The Shadow of Deception -- The Balancing Act -- Just Because You Can -- When the Joke Lands Too Well -- The Power of Saying No -- Shadow Can't Exist Without Light -- What's Next? -- Chapter 4 The Dark Side of Innovation -- The Trust Bias: Why We Believe What We See and Hear -- The Perception Hack: How Deepfakes Trick Our Brains -- The Face Trust Heuristic -- The Voice Familiarity Effect -- The Fluency Effect -- The Emotion Trap -- The Experiment: How Easily Can We Be Fooled? -- The Politeness Barrier: Why People Refuse to Question Reality -- The Wildest Real-Life Failures of Deepfake Detection -- Joe Says No -- X Marks the Spot -- Celebrity Connections -- Fake Endorsements -- Deepfake Pornography.
The Trust Shortcut: Why Deepfakes Work in Social Settings -- When Curiosity Looks Like a Con -- The Emotional Cost of Doubt -- The Role of Big Tech in the Deepfake Crisis -- Identifying the Boundaries -- Why Social Media Fuels Deepfakes (and Doesn't Stop Them) -- The Policy Problem: The Rules Keep Changing -- The Path Forward: Can We Outthink Our Own Biases? -- What's Next? -- Chapter 5 The Rise of Deepfake Crime -- Trust as a Vulnerability -- Beyond Corporate Fraud: The Wider Impact -- A New Kind of Cybercrime -- Trust Is the New Attack Surface -- Human Behavior Is the Weak Link -- The Lasting Victim Impact -- Government Responses -- The Evolution of Detection Tools -- The Evolution of Access: From Experts to Anyone -- What's Next? -- Chapter 6 Proactive Solutions: Staying Ahead of the Curve -- Lessons from SawStop: Preventing Disaster Before It Happens -- Inject, Measure, Verify: The Real-time Deepfake Kill Switch -- The Power of Simple Safeguards -- Personal Code Words -- Slow It Down -- When the Law Isn't Enough: Protecting Your Business from Deepfake Liability -- What's Next? -- Chapter 7 From Theory to Practice: Your 90-Day Implementation Guide -- The First 30 Days: Foundation Building -- Week One -- Week Two -- Week Three -- Week Four -- Days 31-60: System Implementation -- Week Five -- Week Six -- Weeks Seven and Eight -- Days 61-90: Testing and Refinement -- Week Nine -- Week Ten -- Week Eleven -- Week Twelve -- Ongoing: Maintenance and Evolution -- What's Next? -- Chapter 8 The Future of Deepfakes: Where This Is Headed -- Generative Media: Uses and Consequences -- Three-Dimensional Education -- The Effect on "Real" News -- Creativity for the Masses -- Determining the Truth -- Avatars and Synthetic Celebrities -- Rewriting History -- The Future of Reality -- Quantum Computing Speeds -- Directing the Impact of Deepfakes. The Growth and Adoption Cycle -- What's Next? -- Chapter 9 CTRL+ALT+FAKE (Conclusion) -- Acknowledgments -- About the Author -- Index -- EULA. |
| Record Nr. | UNINA-9911047999603321 |
Bogan Carl
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
| Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
| Autore | Snedaker Susan |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , [2014] |
| Descrizione fisica | 1 online resource (602 p.) |
| Disciplina | 658.4/78 |
| Altri autori (Persone) | RimaChris |
| Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-411451-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
| Record Nr. | UNINA-9910459144003321 |
Snedaker Susan
|
||
| Waltham, MA : , : Syngress, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
| Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
| Autore | Snedaker Susan |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
| Descrizione fisica | 1 online resource (xxiii, 577 pages) : illustrations |
| Disciplina | 658.4/78 |
| Collana | Gale eBooks |
| Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
| ISBN | 0-12-411451-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
| Record Nr. | UNINA-9910792484303321 |
Snedaker Susan
|
||
| Waltham, MA : , : Syngress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima
| Business continuity and disaster recovery planning for IT professionals / / Susan Snedaker, Chris Rima |
| Autore | Snedaker Susan |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
| Descrizione fisica | 1 online resource (xxiii, 577 pages) : illustrations |
| Disciplina | 658.4/78 |
| Collana | Gale eBooks |
| Soggetto topico |
Business - Data processing - Security measures
Electronic data processing departments - Security measures Crisis management Computer networks - Security measures Management information systems - Security measures |
| ISBN | 0-12-411451-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine generated contents note: Chapter 1: Business Continuity & Disaster Recovery Overview Chapter 2: Legal and Regulatory Environment Chapter 3: Project Initiation Chapter 4: Risk Assessment Chapter 5: Business Impact Assessment Chapter 6: Risk Mitigation Chapter 7: BC/DR Plan Development Chapter 8: Emergency Response and Recovery Chapter 9: Training, Testing & Auditing Results Chapter 10: BC/DR Plan Maintenance Case Study A: Utilities Case Study B: Healthcare Case Study C: Financial Case Study D: Small/Medium Business Glossary Checklists Resources. |
| Record Nr. | UNINA-9910815456903321 |
Snedaker Susan
|
||
| Waltham, MA : , : Syngress, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CISA Certified Information Systems Auditor Practice Tests
| CISA Certified Information Systems Auditor Practice Tests |
| Autore | Gregory Peter H |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2025 |
| Descrizione fisica | 1 online resource (275 pages) |
| Disciplina | 658.4/78 |
| Altri autori (Persone) | ChappleMike |
| Soggetto topico | Computer security - Examinations |
| ISBN |
1-394-29012-8
1-394-32446-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911019657803321 |
Gregory Peter H
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer incident response and forensics team management : conducting a successful incident response / / Leighton Johnson
| Computer incident response and forensics team management : conducting a successful incident response / / Leighton Johnson |
| Autore | Johnson Leighton |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam : , : Elsevier, , [2014] |
| Descrizione fisica | 1 online resource (349 p.) |
| Disciplina | 658.4/78 |
| Soggetto topico |
Computer crimes - Investigation
Evidence, Criminal Forensic sciences |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-404725-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion. |
| Record Nr. | UNINA-9910453714303321 |
Johnson Leighton
|
||
| Amsterdam : , : Elsevier, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||