Information Security - Thomas Liedtke

Information Security

Opportunities and Limitations

(Autor)

Buch | Softcover
XVII, 207 Seiten
2024
Springer Fachmedien Wiesbaden GmbH (Verlag)
978-3-658-45710-5 (ISBN)
80,24 inkl. MwSt

This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?

Dr. Thomas Liedtke has many years of project and development experience in the areas of functional Safety, Security, and Data Protection in regulated environments. He is a lecturer, coach, and seminar leader for project management, processes, and methods as well as various maturity models.

Fundamentals of Information Security.- Data Protection (Privacy).- Functional Safety (Safety).- Information/Cybersecurity Standards.- Hacking.- Risk Assessment.- IT Service Management.

Erscheinungsdatum
Zusatzinfo XVII, 207 p. 12 illus., 9 illus. in color.
Verlagsort Wiesbaden
Sprache englisch
Original-Titel Informationssicherheit
Maße 168 x 240 mm
Themenwelt Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Wirtschaft Allgemeines / Lexika
Schlagworte Attack Scenarios • Blockchain • cryptography • Cyber Resilience • Cybersecurity standards • Cypersecuritiy • data protection • Data Security • Functional Safety (Safety) • Hacking • Information Security • IT • IT Security • IT Security Act • IT-Service-Management • Laws • risk assessment • security risk analysis • Types of Damage
ISBN-10 3-658-45710-4 / 3658457104
ISBN-13 978-3-658-45710-5 / 9783658457105
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Deterministische und randomisierte Algorithmen

von Volker Turau; Christoph Weyer

Buch | Softcover (2024)
De Gruyter Oldenbourg (Verlag)
64,95
Programmieren erlernen und technische Fragestellungen lösen

von Harald Nahrstedt

Buch | Softcover (2023)
Springer Vieweg (Verlag)
44,99
Grundlagen, Prozesse, Methoden und Werkzeuge

von Jörg Schäuffele; Thomas Zurawka

Buch | Hardcover (2024)
Springer Vieweg (Verlag)
99,99