Rbizo.com
Zoeken in :



Beste resultaten voor: beveiliging insiders <
Boek

Foto:
Rubriek: Boek
Prijs: 13.5
Verzending: Voor 23:59 uur besteld, donderdag in huis
Virussen hoaxes Trojaanse paarden wormen spam cookies spyware dialers... Deze en vele andere ongemakken houden miljoenen computergebruikers dagelijks bezig. Met de schijnbaar onophoudelijke groei van het aantal mogelijkheden neemt ook de zorg om beveiliging van... Lees meer.


Foto:
Rubriek: Boek
Prijs: 20.99
Verzending: Direct beschikbaar
Land the perfect cybersecurity role and move up the ladder with this insightful resource Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security te... Lees meer.


Foto:
Rubriek: Boek
Prijs: 55
Verzending: Uiterlijk 1 februari in huis
Insider Threat - A Guide to Understanding Detecting and Defending Against the Enemy from Within looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It als... Lees meer.


Foto:
Rubriek: Boek
Prijs: 31.99
Verzending: Direct beschikbaar
Since 2001 the CERT Insider Threat Center at Carnegie Mellon University s Software Engineering Institute SEI has collected and analyzed information about more than seven hundred insider cyber crimes ranging from national security espionage to theft of trade secrets... Lees meer.


Foto:
Rubriek: Boek
Prijs: 128.75
Verzending: 2 - 3 weken
Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security community corporate investigations and law enforcement to this work on insider risk. It also outlines the many current... Lees meer.


Foto:
Rubriek: Boek
Prijs: 40.87
Verzending: Uiterlijk 30 januari in huis
... Lees meer.


Foto:
Rubriek: Boek
Prijs: 125
Verzending: 2 - 3 weken
Today s malware mutates randomly to avoid detection but reactively adaptive malware is more intelligent learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses reactively adaptive malware dep... Lees meer.


Foto:
Rubriek: Boek
Prijs: 38.99
Verzending: Direct beschikbaar
Every type of organisation is vulnerable to insider abuse errors and malicious attacks. grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees contractors or other business partners who have bee... Lees meer.


Foto:
Rubriek: Boek
Prijs: 146.31
Verzending: Uiterlijk 25 januari in huis
Managing the Insider Threat. No Dark Corners and the Rising Tide Menace Second Edition follows up on the success of and insight provided by the first edition reframing the insider threat by distinguishing between sudden impact and slow onset aka rising tide inside... Lees meer.


Foto:
Rubriek: Boek
Prijs: 210.69
Verzending: 2 - 3 weken
This textbook analyses the origins and effects of insider risk using multiple real-life case histories to illustrate the principles and explains how to protect organisations against the risk. This textbook analyses the origins and effects of insider risk using mu... Lees meer.


Foto:
Rubriek: Boek
Prijs: 69.99
Verzending: 2 - 3 weken
Managing the Insider Threat. No Dark Corners and the Rising Tide Menace Second Edition follows up on the success of and insight provided by the first edition reframing the insider threat by distinguishing between sudden impact and slow onset aka rising tide inside... Lees meer.


Foto:
Rubriek: Boek
Prijs: 25.03
Verzending: Uiterlijk 30 januari in huis
Employees know a company s computer system better than anyone and have access to important information about the company and its customers. This access makes greedy or disgruntled employees to sabotage a system or to sell privileged information. This book presents safeg... Lees meer.


Foto:
Rubriek: Boek
Prijs: 44.7
Verzending: Uiterlijk 25 januari in huis
This textbook analyses the origins and effects of insider risk using multiple real-life case histories to illustrate the principles and explains how to protect organisations against the risk. This textbook analyses the origins and effects of insider risk using mu... Lees meer.


Foto:
Rubriek: Boek
Prijs: 55.99
Verzending: 2 - 3 weken
Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools the types of malware the tools will detect implementation of the tools... Lees meer.




U zocht op beveiliging insiders


Vorige - Volgende

ALTERNATIEVE ZOEK SUGESTIES.

Beveiliging


Page loaded in 1737412511.259181 seconds