Related Books

At the Nexus of Cybersecurity and Public Policy
Language: en
Pages: 170
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 2014-06-16 - Publisher: National Academies Press

DOWNLOAD EBOOK

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transporta
Countering Cyber Sabotage
Language: en
Pages: 232
Authors: Andrew A. Bochman
Categories: Political Science
Type: BOOK - Published: 2021-01-20 - Publisher: CRC Press

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners,
FISMA and the Risk Management Framework
Language: en
Pages: 585
Authors: Daniel R. Philpott
Categories: Computers
Type: BOOK - Published: 2012-12-31 - Publisher: Newnes

DOWNLOAD EBOOK

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law th
Cyber Security Policy Guidebook
Language: en
Pages: 293
Authors: Jennifer L. Bayuk
Categories: Computers
Type: BOOK - Published: 2012-04-24 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, c
Guide to Storage Encryption Technologies for End User Devices
Language: en
Pages: 44
Authors: U.s. Department of Commerce
Categories: Technology & Engineering
Type: BOOK - Published: 2014-01-21 - Publisher: Createspace Independent Publishing Platform

DOWNLOAD EBOOK

In today's computing environment, there are many threats to the confidentiality of information stored on end user devices, such as personal computers, consumer