Similar authors to follow
See more recommendations
About Joseph Steinberg
He has led businesses and divisions within the information-security industry for over two decades, has been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from Cybersecurity for Dummies to the official study guide from which many CISOs study for their certification exams.
He is also one of only 28 people worldwide to hold the suite of advanced information security certifications, CISSP, ISSAP, ISSMP, and CSSLP, indicating that he possesses a rare, robust knowledge of information security that is both broad and deep; his information-security-related inventions are cited in over 150 US patent filings.
Steinberg is also one of the best read columnists in the cybersecurity field, and a respected authority on other emerging technologies - having amassed millions of readers as a regular columnist for Forbes and Inc. magazines.
He co-founded the cybersecurity firms, SecureMySocial and Green Armor Solutions, presently serves as an expert witness and consultant on matters related to information security and emerging technologies, and advises cybersecurity, blockchain, and other emerging technology firms.
Customers Also Bought Items By
Protect your business and family against cyber attacks
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
- Cybersecurity careers
- What to think about to stay cybersecure in the future
Now is the time to identify vulnerabilities that may make you a victim of cyber-crime — and to defend yourself before it is too late.
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding of the five domains of the ISSMP Common Body of Knowledge (CBK®), along with the ability to apply this in-depth knowledge to establish, present, and govern information security programs, while demonstrating management and leadership skills.
Supplying an authoritative review of key concepts and requirements, the Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition is both up to date and relevant. This book provides a comprehensive review of the five domains in the ISSMP CBK: Security Leadership and Management, Security Lifecycle Management, Security Compliance Management, Contingency Management, and Law, Ethics, and Incident Management.
Numerous illustrated examples and practical exercises are included in this book to demonstrate concepts and real-life scenarios. Endorsed by (ISC)2 and compiled and reviewed by ISSMPs and industry luminaries around the world, this book provides unrivaled preparation for the exam. Earning your ISSMP is a deserving achievement that should ultimately help to enhance your career path and give you a competitive advantage.
Toutes les clés pour protéger vos données sur Internet
La cybersécurité consiste à se protéger d'attaques venant de cybercriminels. Ces hackers ont pour but d'utiliser vos données afin de pirater des brevets, des comptes bancaires, et de détourner toutes sortes d'informations personnelles ou secrètes.
La sécurité passe d'abord par la compréhension des attaques, du but recherché par le pirate informatique et ensuite par l'analyse des moyens à mettre en oeuvre pour sécuriser son système informatique.
Au programme :
Evaluer la vulnérabilité de son système informatique
Les concepts de base
Les moyens à mettre en oeuvre pour sécuriser un système informatique
Evaluer et contrer les attaques
Les carrières possibles dans les métiers de la cybersécurité
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
· Shield data from both the internal and external intruder
· Discover products that can detect and prevent these break-ins
· Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
· Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs