Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries.
The second of two volumes, this book about the criminology of Carlo Morselli includes a diversity of contributions that study the social inter-dependence of criminal phenomena.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Der Stromausfall in ganz Berlin ist Auftakt einer Anschlagserie - eine unbekannte Aktivistengruppe namens NTR kämpt gegen die zunehmende Versklavung des Menschen durch Technik.
Dieses Buch aus der Reihe „Neue Ansätze für die IT-Revision“ entwickelt aktuelle und neuartige Methoden für die Arbeit der Revision sowie für Prüfungen und Tests von IT-Systemen.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
Drahtlose Netzwerke sind heute allgegenwärtig und werden im Zuge von Entwicklungen wie dem "Smart Home" und dem "Internet of Things" in Zukunft eine noch wichtigere Schlüsselrolle bei der Informationsvermittlung spielen.
Drahtlose Netzwerke sind heute allgegenwärtig und werden im Zuge von Entwicklungen wie dem "Smart Home" und dem "Internet of Things" in Zukunft eine noch wichtigere Schlüsselrolle bei der Informationsvermittlung spielen.
Ins Netz gegangen – von Hackern, Dieben und SpionenLahmgelegte Industrieanlagen, gestohlene Geheimdokumente und Firmengeheimnisse, manipulierte Wasserkraftwerke, ausgespähte Kontodaten – unsere Abhängigkeit von Computersystemen hat sich zur Achillesferse unseres Lebens entwickelt.
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries.
Leitfaden zur InternetrechercheDer Autor erläutert, wie mit Hilfe des Internets Informationen zu Personen oder Firmen gesucht, gefunden und dokumentiert werden können.
IT-Sicherheit in kleinen und mittelständischen Unternehmen voranbringenIT- und Informations-Sicherheit ist ein komplexes Thema und die Umsetzung nimmt oft viel Zeit und viele Ressourcen in Anspruch.