Nejnižší cena za posledních 60 dní: 1 286 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author's work that set the standard. This
Security Studies: An Introduction, 3rd edition, is the most comprehensive textbook available on the subject, providing students with an essential grounding in the debates, frameworks, and issues on the contemporary security agenda. This new edition has been comprehensively revised and updated, with
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that
An effective strength and conditioning program is an essential component of the preparation of any athlete or sportsperson. Strength and Conditioning for Sports Performance is a comprehensive and authoritative introduction to the theory and practice of strength and conditioning, providing students,
The publication of Feel: Robbie Williams by Chris Heath in September 2004 caused shockwaves of controversy and delight. Written by Chris Heath, who spent nearly two years working with Robbie on this book, every word is imbued with Robbie's humour, charisma, talent, memories and
More than 12 years ago, Robbie Williams and Chris Heath published a ground-breaking memoir, Feel, about Robert P. Williams' rise to fame. Robbie has subce released six solo albums, reunited with his old band Take That, and played a sold-out run at Wembley Stadium. In Reveal, author Chris Heath has
Featuring the youth-building cellulite diet Blast cellulite with a powerful, effective three-step program.Every woman dreads it. But most women---even thin women---have it. Massage systems, topical creams, and going off caffeine won't budge cellulite, and dieting usually doesn't reduce it either
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC) Security Operations Center is the complete guide to building, operating, and managing Security Operations
An attempt to free architecture from site and program constraints and to counter the profusion of ever bigger architecture books with ever smaller content.Some may call it the first manifesto of the twenty-first century, for it lays down a new way to think about architecture. Others may think of it
These days, practically anyone may need to stand before an audience and deliver a great presentation. You're not a professional designer, but you want your slides to look great, persuade your audience, and help you achieve your goals. Do what more than a million people have already done: get
This is 32 CFR Part 117 National Industrial Security Program Operating Manual (NISPOM)Every employee of a cleared defense contractor company should have a copy.This is the bible for establishing classified work for government contracts and establishing a security program to protect classified
A perennial bestseller from a leading authority, this book provides an effective 10-step program for training parents in child behavior management skills (ages 2 to 12). Professionals get proven tools to help parents understand the causes of noncompliant, defiant, oppositional, or socially hostile
Information security issues impact all organizations; however measures used to implement effective measures are often viewed as a business barrier costing a great deal of money. This practical title clearly explains the approaches that most organizations can consider and implement which helps turn
Managing data continues to grow as a necessity for modern organizations. There are seemingly infinite opportunities for organic growth, reduction of costs, and creation of new products and services. It has become apparent that none of these opportunities can happen smoothly without data governance
The 5th edition of Model Building in Mathematical Programming discusses the general principles of model building in mathematical programming and demonstrates how they can be applied by using several simplified but practical problems from widely different contexts. Suggested formulations and
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors
Research shows that online education, when designed and facilitated well, is as effective as traditional campus-based instruction. Despite the evidence, many faculty perceive online education as inferior to traditional instruction--and are often quite vocal in their skepticism. Simultaneously,
It's easier to learn how to program a computer than it has ever been before. Now everyone can learn to write programs for themselves - no previous experience is necessary. Chris Pine takes a thorough, but lighthearted approach that teaches you the fundamentals of computer programming, with a
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current
Building Surveyor's Pocket Book is an accessible encyclopaedia of matters vital to building surveyors. Well-illustrated with diagrams, pictures, tables, and graphs, it covers all essential elements of building pathology, building performance, and building construction terminology in a simple,
Network security is not simply about building impenetrable walls -- determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to