809 products were found matching your search for Cybersecurity in 3 shops:
-
Cybersecurity for Executives: A Practical Guide [first edition]
Vendor: Abebooks.com Price: 70.51 $Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information
-
Pearson Cybersecurity Myths and Misconceptions
Vendor: Textbooks.com Price: 41.39 $A digital copy of "Cybersecurity Myths and Misconceptions" by Eugene H. Spafford. Download is immediately available upon purchase!
-
Netgear Nighthawk AC2300 Cybersecurity Wi-Fi Router
Vendor: Adorama.com Price: 299.99 $Why settle for less when you can have the best with the Nighthawk AC2300 Cybersecurity Wi-Fi Router? This high-speed, reliable, and advanced router is designed to secure every device on your network. With built-in NETGEAR Armor, it shields your home and all your devices from cyber threats such as viruses, malware, spyware, ransomware, phishing, and Internet scams. Experience advanced cyber-threat protection both at home and on-the-go with a 3-year NETGEAR Armor subscription included, covering an unlimited number of personal and smart home devices. No need for additional antivirus subscriptions. This efficient router offers advanced threat detection, identifying and blocking viruses, spyware, ransomware, malicious links, and other Internet scams. The Nighthawk AC2300 Cybersecurity Wi-Fi Router also performs smart home vulnerability scans, regularly checking all connected devices at home to ensure they are not susceptible to hackers. In case of a lost or stolen mobile device, NETGEAR Armor allows you to locate, lock, and wipe data on your smartphone or computer remotely, providing data theft protection. Stay informed with instant alerts, receiving immediate notifications on your smartphone or computer when threats are detected and blocked. This durable router is powered by award-winning cybersecurity provider Bitdefender, a world leader in computer and internet security. Experience high-performance Wi-Fi throughout your home with super-fast speeds up to 2.3Gbps. Enjoy extreme Wi-Fi coverage with high power amplifiers and external antennas, and simultaneous streaming to multiple devices using MU-MIMO technology. The dynamic QoS feature prioritizes bandwidth by application and device, ensuring a smooth and lag-free Wi-Fi experience for gaming, video streaming, or surfing. The Nighthawk AC2300 Cybersecurity Wi-Fi Router also features a dual-core 1GHz processor that boosts overall network performance. With the Circle Smart Parental Controls, you can easily filter online content, limit online screen time, and set an Internet bedtime for your kids, ensuring their safety online. Whether you need cybersecurity for your home or small home office, this router offers multi-layered cyber-threat protection for your business and data. The Nighthawk App makes it easy to set up your router and get more out of your Wi-Fi, providing an intuitive dashboard to pause the internet on your connected device, run a quick Internet speed test, set up smart parental controls, and much more. Choose the Nighthawk AC2300 Cybersecurity Wi-Fi Router for a fast, reliable, and secure internet connection.
-
Netgear Nighthawk AC2300 Cybersecurity Wi-Fi Router
Vendor: Adorama.com Price: 80.00 $Why settle for less when you can have the best with the Nighthawk AC2300 Cybersecurity Wi-Fi Router? This high-speed, reliable, and advanced router is designed to secure every device on your network. With built-in NETGEAR Armor, it shields your home and all your devices from cyber threats such as viruses, malware, spyware, ransomware, phishing, and Internet scams. Experience advanced cyber-threat protection both at home and on-the-go with a 3-year NETGEAR Armor subscription included, covering an unlimited number of personal and smart home devices. No need for additional antivirus subscriptions. This efficient router offers advanced threat detection, identifying and blocking viruses, spyware, ransomware, malicious links, and other Internet scams. The Nighthawk AC2300 Cybersecurity Wi-Fi Router also performs smart home vulnerability scans, regularly checking all connected devices at home to ensure they are not susceptible to hackers. In case of a lost or stolen mobile device, NETGEAR Armor allows you to locate, lock, and wipe data on your smartphone or computer remotely, providing data theft protection. Stay informed with instant alerts, receiving immediate notifications on your smartphone or computer when threats are detected and blocked. This durable router is powered by award-winning cybersecurity provider Bitdefender, a world leader in computer and internet security. Experience high-performance Wi-Fi throughout your home with super-fast speeds up to 2.3Gbps. Enjoy extreme Wi-Fi coverage with high power amplifiers and external antennas, and simultaneous streaming to multiple devices using MU-MIMO technology. The dynamic QoS feature prioritizes bandwidth by application and device, ensuring a smooth and lag-free Wi-Fi experience for gaming, video streaming, or surfing. The Nighthawk AC2300 Cybersecurity Wi-Fi Router also features a dual-core 1GHz processor that boosts overall network performance. With the Circle Smart Parental Controls, you can easily filter online content, limit online screen time, and set an Internet bedtime for your kids, ensuring their safety online. Whether you need cybersecurity for your home or small home office, this router offers multi-layered cyber-threat protection for your business and data. The Nighthawk App makes it easy to set up your router and get more out of your Wi-Fi, providing an intuitive dashboard to pause the internet on your connected device, run a quick Internet speed test, set up smart parental controls, and much more. Choose the Nighthawk AC2300 Cybersecurity Wi-Fi Router for a fast, reliable, and secure internet connection.
-
Cybersecurity: Engineering a Secure Information Technology Organization
Vendor: Abebooks.com Price: 23.55 $Software is essential and pervasive in the modern world, but software acquisition, development, operation, and maintenance can involve substantial risk, allowing attackers to compromise millions of computers every year. This groundbreaking book provides a uniquely comprehensive guide to software security, ranging far beyond secure coding to outline rigorous processes and practices for managing system and software lifecycle operations. The book opens with a comprehensive guide to the software lifecycle, covering all elements, activities, and practices encompassed by the universally accepted ISO/IEEE 12207-2008 standard. The authors then proceed document proven management architecture and process framework models for software assurance, such as ISO 21827 (SSE-CMM), CERT-RMM, the Software Assurance Maturity Model, and NIST 800-53. Within these models, the authors present standards and practices related to key activities such as threat and risk evaluation, assurance cases, and adversarial testing. Ideal for new and experienced cybersecurity professionals alike in both the public and private sectors, this one-of-a-kind book prepares readers to create and manage coherent, practical, cost-effective operations to ensure defect-free systems and software.
-
Cybersecurity and Privacy Law in a Nutshell (Nutshells)
Vendor: Abebooks.com Price: 49.47 $Cybersecurity and Privacy Law in a Nutshell by Jay P. Kesan and Carol M. Hayes provides a comprehensive and up-to-date overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this Nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age.
-
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Vendor: Abebooks.com Price: 31.36 $Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include:Planning and practicingDetectionContainmentEradicationPost-incident actionsWhat You’ll LearnKnow the sub-categories of the NIST Cybersecurity FrameworkUnderstand the components of incident responseGo beyond the incident response planTurn the plan into a program that needs vision, leadership, and culture to make it successfulBe effective in your role on the incident response teamWho This Book Is For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong
-
Cybersecurity for Commercial Vehicles
Vendor: Abebooks.com Price: 91.66 $This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack. It delivers details on key subject areas including: SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems The differences between automotive and commercial vehicle cybersecurity. Forensics for identifying breaches in cybersecurity. Platooning and fleet implications. Impacts and importance of secure systems for today and for the future. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and dynamic story of how industry is developing solutions that address the critical security issues; the key social, policy, and privacy perspectives; as well as the integrated efforts of industry, academia, and government to shape the current knowledge and future cybersecurity for the commercial vehicle industry.
-
Cybersecurity:The Essential Body Of Knowledge, 1st Ed
Vendor: Abebooks.com Price: 62.74 $CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.
-
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
Vendor: Abebooks.com Price: 23.43 $If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.In four parts, security practitioners, administrators, and students will examine:Foundations: Principles of defense and offense, command-line and bash basics, and regular expressionsDefensive security operations: Data collection and analysis, real-time log monitoring, and malware analysisPenetration testing: Script obfuscation and tools for command-line fuzzing and remote accessSecurity administration: Users, groups, and permissions; device and software inventory
-
Cybersecurity Ethics: An Introduction
Vendor: Abebooks.com Price: 32.61 $Exact ISBN match. Immediate shipping. No funny business. Pics available upon request.
-
Cybersecurity for Connected Medical Devices
Vendor: Abebooks.com Price: 96.19 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 1.19
-
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Vendor: Abebooks.com Price: 29.53 $Like New condition. Great condition, but not exactly fully crisp. The book may have been opened and read, but there are no defects to the book, jacket or pages. 1.38
-
The Cybersecurity Endgame: America's Race Against Time
Vendor: Abebooks.com Price: 49.03 $Like New condition. Great condition, but not exactly fully crisp. The book may have been opened and read, but there are no defects to the book, jacket or pages. 0.85
-
Cybersecurity Playbook : How Every Leader and Employee Can Contribute to a Culture of Security
Vendor: Abebooks.com Price: 24.01 $The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity―but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.
-
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks
Vendor: Abebooks.com Price: 48.94 $Unread book in perfect condition.
-
Cybersecurity for Executives in the Age of Cloud
Vendor: Abebooks.com Price: 22.95 $Text block, wraps and binding are in like new condition, without markings of any kind. Well packaged and promptly shipped from California. Partnered with Friends of the Library since 2010.
-
Cybersecurity : The Insights You Need from Harvard Business Review
Vendor: Abebooks.com Price: 38.65 $Unread book in perfect condition.
-
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Vendor: Abebooks.com Price: 38.64 $Book is in NEW condition. 1.57
-
Cybersecurity Essentials Format: Paperback
Vendor: Abebooks.com Price: 30.97 $An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. Learn security and surveillance fundamentals Secure and protect remote access and devices Understand network topologies, protocols, and strategies Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
809 results in 0.218 seconds
Related search terms
© Copyright 2024 shopping.eu