现在位置 >首页 >
所有关于信息安全的文章
BOOK DESCRIPTION:
Many talk about the unlimited opportunities of data and information assets. But, bad data and information can also severely hurt your business and create considerable risk. Managing risk is a new angle to selling data quality projects to upper managers who do not want to take the time to learn about the value of data quality.
Total Information Risk Management provides you with a step by step process to identify, quantify and mitigate the risks arisin...
BOOK DESCRIPTION:
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, i...
Book Description:
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren’t broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like ...
随便看看
- A. 性学观止(上下册)
- B. 管人方与圆:最有效的99个管人方法
- C. Practical MLOps: Operationalizing Machine Learning M
- D. 看人看到骨子里
- E. 美国梦
- F. 平台战略:正在席卷全球的商业模式革命
- G. MBA教不了的创富课
- H. 重来2