Show Summary Details

S

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
S SOC performance data architecture 23.51 — 23.53 SQL injection threats, and 1.03 SWIFT payment network aerospace, defence and security sector, and 10.457 — 10.459 Safety of employees cyber-attacks 20.40 — 20.41 Scalable backup systems generally 22.43 introduction 22.18 Scanning vulnerabilities, and 2.66 — 2.67 Screening employees social media policy, and 11.49 — 11.55 Script kiddies (skiddies) threats, and 1.17 Search orders cyber-crime, and 19.143 Security architecture accelerating adoption of OT security mitigations 4.97 data driven assessments 4.77 generally 4.67 phishing 4.93 Security engineering NCSC ‘problem book’, and 4.68 Security improvements generally 22.35 — 22.36 introduction 22.25 Security in the built environment accountability for security of systems and data generally 6.36 operational level, at 6.41 — 6.42 strategic level, at 6.37 — 6.40 adverse effects on systems and data 6.48 — 6.60 assets to be protected 6.43 — 6.47 build asset information 6.16 Building Information Modelling 6.04 built asset lifecycle ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.