Datorsäkerhet
Filter
An ideal introduction to PCI DSS v3.2.1All businesses that accept payment cards are prey for criminal hackers trying to steal financial information and commit identity fraud. The …
Guide étape par étape vers une mise en œuvre réussie de la norme ISO 27001Rédigé dans un langage pratique et non technique, ce guide vous guidera au travers des étapes clés d''un …
Protect your information assets with effective risk managementIn today's information economy, the development, exploitation and protection of informationand associatedassets are …
The web application stack - a growing threat vectorUnderstand the threat and learn how to defend your organisationThis book is intended for application developers, system …
An ideal introduction to PCI DSS v3.2.1All businesses that accept payment cards are prey for criminal hackers trying to steal financial information and commit identity fraud. The …
Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen it's entirely useless at …
Step-by-step guidance on successful ISO 27001 implementation from an industry leaderISO 27001 is the international standard that sets out the requirements of an information …
Build a strategic response to cyber attacksThe activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in …
Schützen Sie die Informationen Ihrer Organisation mit ISO27001:2013Informationen gehören zu den wichtigsten Ressourcen Ihrer Organisation und ihre Sicherheit ist überlebenswichtig …
Defend your business, protect your livelihood, safeguard your future.How safe are you online?Is your information protected?What risks are you taking with your data?How do you …