CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition by Julie Mehan
Author:Julie Mehan [Mehan, Julie]
Language: eng
Format: azw3
ISBN: 9781849285735
Publisher: IT Governance Publishing
Published: 2015-05-19T04:00:00+00:00
1 This is the expression of one of the more significant results of the 2006 Global Information Security Workforce Study conducted by IDC on behalf of the International Information System Security Certification Consortium (ISC)2. This annual study is intended to expose the opinions of security professionals today and to provide a glimpse into the future of the security profession.
2 There are many more types of standards than those addressing security. For the purposes of this text, the use of the term ‘standards’ will imply ‘security standards’.
3 Note: ISO is not an abbreviation for international standards; legend states that it is derived from ‘isos’, a Greek word for equal.
4 Specifics on the development of standards, in particular international standards, can be found on the ISO website at www.iso.org/iso/standards_development/processes_and_procedures/how_are_standards_developed.htm.
5 These definitions are from SC27 Standing Document (SD 6), which contains terms and definitions that appear in SC27 International Standards, Technical Reports and Drafts. The entire list of approved definitions can be obtained at: www.jtc1sc27.din.de/cmd?level=tpl-artikel&languageid=en&cmstextid=SD6.
6 Process improvement can be defined as a proactive management level activity focused on continuous monitoring of a process and its results and using analysis to develop mechanisms for enhancing future performance.
7 Use of the term quagmire in connection with standards and frameworks was introduced by the Software Productivity Consortium in the late 1990s. Although the focus was primarily on standards used in software and systems engineering, the same level of complexity is found in the security standards realm.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12396)
Hello! Python by Anthony Briggs(9747)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9634)
The Mikado Method by Ola Ellnestam Daniel Brolund(9630)
Dependency Injection in .NET by Mark Seemann(9158)
Hit Refresh by Satya Nadella(8666)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8145)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(8000)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7651)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7648)
Grails in Action by Glen Smith Peter Ledbrook(7561)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7387)
The Complete Stick Figure Physics Tutorials by Allen Sarah(6956)
The Kubernetes Operator Framework Book by Michael Dame(6772)
Exploring Deepfakes by Bryan Lyon and Matt Tora(6527)
Practical Computer Architecture with Python and ARM by Alan Clements(6480)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(6463)
Robo-Advisor with Python by Aki Ranin(6450)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(6432)
