Related Books

Practices for Securing Critical Information Assets
Language: en
Pages: 104
Authors:
Categories: Computer networks
Type: BOOK - Published: 2000 - Publisher:

GET EBOOK

Effective Model-Based Systems Engineering
Language: en
Pages: 788
Authors: John M. Borky
Categories: Technology & Engineering
Type: BOOK - Published: 2018-09-08 - Publisher: Springer

GET EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise p
Computers at Risk
Language: en
Pages: 320
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1990-02-01 - Publisher: National Academies Press

GET EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided
Managing Information Security Risks
Language: en
Pages: 516
Authors: Christopher J. Alberts
Categories: Business & Economics
Type: BOOK - Published: 2003 - Publisher: Addison-Wesley Professional

GET EBOOK

Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of
Guide to Protecting the Confidentiality of Personally Identifiable Information
Language: en
Pages: 59
Authors: Erika McCallister
Categories: Computers
Type: BOOK - Published: 2010-09 - Publisher: DIANE Publishing

GET EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few yea