Information Risk and Security | Agenda Bookshop Skip to content
1990
A01=Edward Wilding
Access Control Records
act
Age Group_Uncategorized
Age Group_Uncategorized
audit
Audit Trail Data
Author_Edward Wilding
automatic-update
BACS
Call Logs
Category1=Non-Fiction
Category=JKVK
CCTV Recording
computer
Computer Evidence
COP=United Kingdom
Covert Investigation
crime
Critical Point Auditing
data
Data Storage Media
Defensive Strategy
Delivery_Pre-order
Devious
Electronic Data Processing System
eq_isMigrated=2
eq_non-fiction
eq_society-politics
Hard Disk
Internal Revenue Service
IP Address
Job Function
Language_English
Laptop Computers
media
misuse
Network Event Log
PA=Temporarily unavailable
Price_€50 to €100
PS=Active
Sensitive Information
Shoulder Surfing
softlaunch
SSID
storage
Target Area
trails
Unallocated Clusters
Violated
Wireless LAN

Information Risk and Security

English

By (author): Edward Wilding

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems. See more
€59.99
1990A01=Edward WildingAccess Control RecordsactAge Group_UncategorizedauditAudit Trail DataAuthor_Edward Wildingautomatic-updateBACSCall LogsCategory1=Non-FictionCategory=JKVKCCTV RecordingcomputerComputer EvidenceCOP=United KingdomCovert InvestigationcrimeCritical Point AuditingdataData Storage MediaDefensive StrategyDelivery_Pre-orderDeviousElectronic Data Processing Systemeq_isMigrated=2eq_non-fictioneq_society-politicsHard DiskInternal Revenue ServiceIP AddressJob FunctionLanguage_EnglishLaptop ComputersmediamisuseNetwork Event LogPA=Temporarily unavailablePrice_€50 to €100PS=ActiveSensitive InformationShoulder SurfingsoftlaunchSSIDstorageTarget AreatrailsUnallocated ClustersViolatedWireless LAN

Will deliver when available.

Product Details
  • Weight: 670g
  • Dimensions: 174 x 246mm
  • Publication Date: 23 Aug 2018
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Language: English
  • ISBN13: 9781138380967

About Edward Wilding

Edward Wilding has investigated several hundred cases of computer fraud and misuse in many jurisdictions. His previous book, Computer Evidence: A Forensic Investigations Handbook (Sweet and Maxwell 1996) was one of the first to discuss computer forensic investigations. The author has lectured widely, trained incident response teams, and conducted security and risk reviews for a diversity of clients. He has also served as an expert witness in civil and criminal cases, tribunals and official hearings, including the Hutton Inquiry. In 2002, he co-founded Data Genetics International (DGI), specializing in computer crime investigation, incident response and forensic evidence.

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept