Search "Cybersecurity"

Kosseff, Jeff - Cybersecurity Law, ebook

Cybersecurity Law

Kosseff, Jeff


A definitive guide to cybersecurity law
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis

Geer, Daniel E. - How to Measure Anything in Cybersecurity Risk, ebook

How to Measure Anything in Cybersecurity Risk

Geer, Daniel E.


A ground shaking exposé on the failure of popular cyber risk management methods
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.

Baumard, Philippe - Cybersecurity in France, ebook

Cybersecurity in France

Baumard, Philippe


Table of contents
1. Introduction
Philippe Baumard
2. A Brief History of Hacking and Cyberdefense
Philippe Baumard
3. The Determinants of a National Cyber-Strategy
Philippe Baumard
4. National Cyber-Doctrines: Forthcoming Strategic…

Bailey, Tucker - Beyond Cybersecurity: Protecting Your Digital Business, ebook

Beyond Cybersecurity: Protecting Your Digital Business

Bailey, Tucker


Beyond Cybersecurity is based on original risk assessment analysis conducted by McKinsey and first presented the World Economic Forum. The book's contentis based on McKinsey's proprietary research, client experience and interviews with over 200 executives, regulators and security experts.

Ayala, Luis - Cybersecurity Lexicon, ebook

Cybersecurity Lexicon

Ayala, Luis


Table of contents
1. #
Luis Ayala
2. A
Luis Ayala
3. B
Luis Ayala
4. C
Luis Ayala
5. D
Luis Ayala
6. E
Luis Ayala
7. F
Luis Ayala
8. G
Luis Ayala
9. H
Luis Ayala
10. I

Waschke, Marvin - Personal Cybersecurity, ebook

Personal Cybersecurity

Waschke, Marvin


Table of contents
1. What’s Biting Us
Marvin Waschke
2. Why Is Computer Security So Weak?
Marvin Waschke
3. How Does Computer Security Work?
Marvin Waschke
4. Your Computer Is a Target
Marvin Waschke
5. Misuse of Computers

Lee, Newton - Counterterrorism and Cybersecurity, ebook

Counterterrorism and Cybersecurity

Lee, Newton


Table of contents
Part I. Counterterrorism in Retrospect: Then and Now
1. September 11 Attacks
Newton Lee
2. U.S. Intelligence Community
Newton Lee
Part II. Counterterrorism Technologies: Total Information Awareness and Data Mining