Datorsäkerhet
Filter
Cyber Essentials - A guide to Cyber Essentials and Cyber Essentials Plus certificationsCyber attacks are a fact of life in the information age. For any organisation that connects …
In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational …
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real …
What do you do to keep your business information secure? Information and information systems are vital to every organisation. Our reliance on data and information, and the fact …
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information …
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional.For the foreseeable future (and perhaps …
It'll never happen to us ...Or will it? There are no guarantees. Disasters happen. Can you be sure they won't happen to your organisation? And are you prepared if they do? No two …
The primary purpose of computer forensics is to enable organisations to pinpoint where the malware has infected their computer systems and which files have been infected, so that …