logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Assessing Information Security Strategies Tactics Logic And Framework 2nd 2nd A Vladimirov

  • SKU: BELL-53166906
Assessing Information Security Strategies Tactics Logic And Framework 2nd 2nd A Vladimirov
$ 31.00 $ 45.00 (-31%)

4.3

58 reviews

Assessing Information Security Strategies Tactics Logic And Framework 2nd 2nd A Vladimirov instant download after payment.

Publisher: IT Governance Publishing
File Extension: EPUB
File size: 4.17 MB
Pages: 341
Author: A Vladimirov, K Gavrilenko, A Michajlowski
ISBN: 9781849286015, 1849286019
Language: English
Year: 2016
Edition: 2nd

Product desciption

Assessing Information Security Strategies Tactics Logic And Framework 2nd 2nd A Vladimirov by A Vladimirov, K Gavrilenko, A Michajlowski 9781849286015, 1849286019 instant download after payment.

Build a strategic response to cyber attacks

The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that explain what to do when under attack.

Cyber crime… cyber war?

With this in mind, the authors have drawn on the work of Clausewitz and Sun Tzu, and applied it to the understanding of information security that they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

Building on the success of the first edition, this new edition covers the most recent developments in the threat landscape and the best-practice advice available in the latest version of ISO 27001:2103.

Related Products