Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is same as your student ID number or Employee ID number for password please contact to Circulation Staff)

Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden

By: Material type: TextTextPublication details: Germany Wiesbaden : Springer Vieweg, 2018Description: 643 color illustrations ; 24 cmISBN:
  • 978-3658216542
Subject(s): DDC classification:
  • 23 005.8 BAR
Summary: The topic of cybersecurity is more topical than ever, because it is difficult to set limits in terms of access to information, data and freedom of speech in cyberspace. Criminals often take advantage of the gaps. The large number of IT systems, their different types of use and their innovation and life cycles have led to high security risks for companies and government institutions. These risks will not be easily eliminated in the long term. Therefore institutions have to develop strategies and solutions for their self-protection. This book describes approaches and best practices from a wide variety of areas that have been shown to lead to greater resilience to cyberattacks. Globally renowned IT security experts report in 40 articles how state institutions, including the military (cyber defense), authorities, international organizations and companies, can better protect themselves against cyber attacks and develop sustainable protection strategies. The authors address the reasons and goals underlying their respective strategies, report on how companies reacted to specific cyber attacks and how individual state institutions act in the face of national cyber strategies. In further chapters, scientists show what is already possible today in the defense against cyber attacks, which developments are in progress and how they can be used in the future to increase cyber security. In the last chapter, manufacturers, user companies and service providers report which best practices they have introduced in their companies and how other companies can follow their example. The book is aimed at IT managers and security officers in companies and other organisations, but also at students in the various IT courses
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Barcode
Book Book Air University Central Library Islamabad Cyber Security Cyber Security 005.8 BAR (Browse shelf(Opens below)) Available Computer science. Leadership. Management information systems. P6161

Includes bibliographical references and index.

The topic of cybersecurity is more topical than ever, because it is difficult to set limits in terms of access to information, data and freedom of speech in cyberspace. Criminals often take advantage of the gaps. The large number of IT systems, their different types of use and their innovation and life cycles have led to high security risks for companies and government institutions. These risks will not be easily eliminated in the long term. Therefore institutions have to develop strategies and solutions for their self-protection. This book describes approaches and best practices from a wide variety of areas that have been shown to lead to greater resilience to cyberattacks.

Globally renowned IT security experts report in 40 articles how state institutions, including the military (cyber defense), authorities, international organizations and companies, can better protect themselves against cyber attacks and develop sustainable protection strategies. The authors address the reasons and goals underlying their respective strategies, report on how companies reacted to specific cyber attacks and how individual state institutions act in the face of national cyber strategies. In further chapters, scientists show what is already possible today in the defense against cyber attacks, which developments are in progress and how they can be used in the future to increase cyber security. In the last chapter, manufacturers, user companies and service providers report which best practices they have introduced in their companies and how other companies can follow their example.

The book is aimed at IT managers and security officers in companies and other organisations, but also at students in the various IT courses

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631