Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

623 tulosta hakusanalla Cissy Lacks

Faith and Freedom in Galatia and Senegal: The Apostle Paul, Colonists and Sending Gods
Faith and Freedom in Galatia and Senegal reads Galatians 2:11-15 and 3:26-29 through the lens of the 19th-20th century experiences of French colonialism by the Diola people in Senegal, West Africa, and portrays the Apostle Paul as a "'sociopostcolonial hermeneut who acted on his self-understanding as God's messenger to create, through faith in the cross of Christ, free communities' -- a self-definition that is critical of ancient Graeco-Roman and modern colonial lore that justify colonization as a divine mandate." Aliou C. Niang ingeniously compares the colonial objectification of his own people by French colonists to the Graeco-Roman colonial objectifications of the ancient Celts/Gauls/Galatians, and Paul's role in bringing about a different portrayal.
Les Traumatismes Vertebro-Medullaires dans le Service de Neurochirurgie de l'Hopital du Mali
Nous avons men une tude prospective et descriptive portant sur les traumatismes vertebro-medullaires dans le service de Neurochirurgie de l'h pital du Mali. Notre tude s'est d roul e sur une p riode allant du 1er octobre 2017 au 30 septembre 2018, ayant pour objectifs sp cifiques de d terminer l' tiologie des TVM, tablir la fr quence, d crire les attitudes th rapeutiques et le suivi des malades traumatis s vertebro- medullaires. Pendant notre p riode d' tude, nous avons enregistr 42 cas de traumatismes vertebro-medullaires sur une p riode de 12 mois, 561 patients ont t hospitalis s dans le service dont 453 patients pour prise en charge neurochirurgicale. Les atteintes rachidiennes traumatiques repr sentaient 7,48% des hospitalis s du service. Dans notre tude, la tranche d' ge de 15 29 ans tait la plus touch e avec une fr quence de 42,9% et la moyenne tait de 30 ans avec des extr mes de 0 89 ans. Les accidents de la voie publique (AVP) ont repr sent de loin la premi re cause des traumatismes du rachis dans notre tude 40,5% suivies des chutes d'arbres 23,8%. Dans notre tude 71,4% des traumatismes ont eu lieu hors de Bamako. La parapl gie compl te tait le motif de consultation le plus fr quent avec 50% et 52,4% tait class Franckel A. La tomodensitom trie a t r alis e chez 97,6% des patients. L' tage cervical a t le plus repr sent avec une fr quence de 38.1%. La fracture et tassement vert bral a t la l sion la plus chiffr e avec une fr quence de 23,4%. La chirurgie a concern 78,57 % de nos malades. Les escarres ont t la complication la plus retrouv e avec 28,6%. Nous avons enregistr trois cas de d c s. La dur e d'hospitalisation tait inf rieure 15 jours chez la majorit de nos patients. Le pronostic de la maladie d pend du type de l sion, de la rapidit diagnostic et de la prise en charge. Les signes cliniques et les complications restent domin s par les parapl gies et les t trapl gies, les troubles g nito-sphinct riens et les complications du d cubitus. Mots cl s: Traumatisme vertebro-medullaire, AVP, Imagerie, Pronostic.
Cybersecurity-Threat Hunting Process (C-THP) Roadmap-2ND EDITION

Cybersecurity-Threat Hunting Process (C-THP) Roadmap-2ND EDITION

Mark a Russo Cissp-Issap Ceh

Independently Published
2019
pokkari
ACTIVELY MONITOR, DISSUADE, AND DEFEAT THE CYBER-THREAT IN YOUR IT ENVIRONMENTS. This book is the definitive guide to building your in-house Cyber Threat Hunt capability.This is a book for advanced cybersecurity personnel and does demand additional resources to support its implementation. In this SECOND EDITION, the author adds several key improvements. He adds a chapter on Mission Planning. How to create a tactical planning process from your Incident Response team, to your Cybersecurity Threat Intelligence (CTI) analysts to your Hunt team. He also introduces readers to the growing interest and capabilities of Cyber-Deception as a next step in cyber-defense.This book is designed to implement the most extensive Cybersecurity-Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. C-THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad guys" in their tracks. How do you select, collect, align, and integrate data and information for tracking daily operations and overall organizational security? How can you ensure that plans include every C-THP task and that all possibilities are considered and responded to by the Incident Response Team? How can you save time investigating and responding to strategic and tactical threats with limited resources? This book is designed to help you create an effective and repeatable THP.From the best-selling International Cybersecurity author and lecturer, Mr. Mark A. Russo, who holds multiple cybersecurity certifications from several international bodies to include the International Information System Security Certification Consortium, (ISC2), the premier certification body for cybersecurity, and the International Council of Electronic Commerce Consultants (EC Council). Mr. Russo has extensive experience applying cybersecurity and threat intelligence expertise for over 20 years as a retired intelligence officer from the United States Army. His books are published in multiple languages to include Spanish, German, and French. He is considered to be a foremost authority on Cybersecurity Threat Intelligence (CTI) and the C-THP. He is the former Chief Information Security Officer (CISO) at the Department of Education where he was responsible for clearing an over 5-year backlog in security findings by the Inspector General's Office and the House Oversight Committee.Don't be fooled by writers who have neither professional certifications or experience in the field of cybersecurity. Mr. Russo has worked the grassroots challenges of cyberspace throughout his detailed and extensive public and private sector security career. He will guide you based on a proven track record of answers to better understand and implement solutions efficiently and rapidly.
NIST 800-171 rev. 1

NIST 800-171 rev. 1

Mark a Russo Cissp-Issap Ceh

Independently Published
2019
pokkari
Written by the former Chief Information Security Officer for the Department of Education (CISO) responsible for closing over 95% of ED's security findings by the Congress.This book is for the cybersecurity specialist or professional needing to understand and implement the 110 NIST SP 800-171 security controls. It is not just about the protection of Controlled Unclassified Information (CUI) because your institution is receiving federal funds. It's about protecting the nation's Intellectual Property (IP)...and you are the first line of defense.This book is written as a step-by-step approach to the 110 security controls. Not all controls need to address immediately, but must be documented, monitored, and managed during the life of the system and data housed within university data centers. Additionally, included are the additional "sub-controls" that were released in June 2018. While this has added to the number of total controls, if the cybersecurity professional or specialist has completely implemented the base control, many of these added controls can be easily answered and addressed to government contract oversight officials.There is still much more work that needs to be done in the area of cybersecurity. We are constantly reminded of ongoing intrusions to both public and private sector websites. What we do here, unlike so many books and articles, is that we describe the "how" to do and fix the specific control. While the challenges are many and ever-changing, the objective of this book is to provide you an initial start-point with many directions to good and complete resources to protect not just CUI data, but the overall IP of your college, university, or research facility.The author is the former CISO at the Department of Education where 2016 he led the effort to close over 95% of the outstanding US Congressional and Inspector General cybersecurity shortfall weaknesses spanning as far back as five years.Mr. Russo is the former Senior Cybersecurity Engineer supporting the Joint Medical Logistics Development Functional Center of the Defense Health Agency (DHA) at Fort Detrick, MD. He led a team of engineering and cybersecurity professionals protecting five major Medical Logistics systems supporting over 200 DOD Medical Treatment Facilities around the globe. In 2011, Mr. Russo was certified by the Office of Personnel Management as a graduate of the Senior Executive Service Candidate program. From 2009 through 2011, Mr. Russo was the Chief Technology Officer at the Small Business Administration (SBA). He led a team of over 100 IT professionals in supporting an intercontinental Enterprise IT infrastructure and security operations spanning 12-time zones; he deployed cutting-edge technologies to enhance SBA's business and information sharing operations supporting the small business community. Mr. Russo was the first-ever Program Executive Officer (PEO)/Senior Program Manager in the Office of Intelligence & Analysis at Headquarters, Department of Homeland Security (DHS), Washington, DC. Mr. Russo was responsible for the development and deployment of secure Information and Intelligence support systems for OI&A to include software applications and systems to enhance the DHS mission. He was responsible for the program management development lifecycle during his tenure at DHS. He holds a Master of Science from the National Defense University in Government Information Leadership with a concentration in Cybersecurity and a Bachelor of Arts in Political Science with a minor in Russian Studies from Lehigh University. He holds Level III Defense Acquisition certification in Program Management, Information Technology, and Systems Engineering. He has been a member of the DOD Acquisition Corps since 2001.
Scrm 2.0

Scrm 2.0

Mark a Russo Cissp-Issap Itilv3

Independently Published
2019
pokkari
A GUIDE FOR 2020 SUPPLY CHAIN RISK MANAGEMENT (SCRM) APPLICATION IN THE REAL WORLD..In this 2021 re-release of the SCRM 2.0, there has been added clarification of control implementation. NIST SP 800-161 controls are critical to a successful Supply Chain Risk Management process, vital to ensuring that hardware, software, and services are equally vetted to ensure that supply chain elements are free from defect, counterfeit, or fraud. This update is designed to provide greater clarity needed to ensure an active defensive posture by public and private sector organizations.Welcome to the next iteration of SCRM. Based on a detailed explanation of current threats and application of NIST SP 800-161. From the internationally acclaimed cybersecurity thought-leader, Mr. Russo provides two distinct NIST 800-161, "Supply Chain Risk Management Practices for Federal Information Systems and Organizations," approaches to resolve the modern day challenge of SCRM. The solutions, while similar, provide a 21st Century resolution to better approach in a systematic way to prevent compromises to the US and global IT supply chain.The use of varied supply chain attacks by cyber attackers to access, for example, software development infrastructures have been major vectors of concerns for governments as well as the private sector. These attacks typically include targeting publicly connected software "build, test, update servers," and other portions of a software development environment. Nation-state agents can then inject malware into software updates and subsequent releases have far-ranging impacts to the IT supply chain; the challenge continues to grow.SCRM 1.0 is a concept for establishing an effective and repeatable process that can be applied against standard supply chain components such as hardware, firmware, software, etc. The author introduces SCRM 2.0, much like SCRM 1.0 (Product-based approach), the need is to turn to a much more precarious aspect of SCRM. We must consider the service piece of SCRM that includes the people, companies, and organizations along the supply chain that may also be compromised within the global marketing of IT equipment and capabilities. This is the next most significant issue facing the field of cybersecurity protection in the 21st Century. This updated version updates content for the reader and adds more clarity on the topic of SCRM in 2020.
Business Practical Security

Business Practical Security

J Brantley Briegel Cissp Cism Chsp

iUniverse
2020
pokkari
A complete and proven Information Security Program manual used by numerous organizations to apply practical security controls. The Business Practical Security manual has been customized and implemented in industries such as financial, legal, medical, government, engineering, manufacturing, education, religion, nonprofit, advertising, broadcasting, and more. The manual contains template policies, standards, guidelines, and risk management tools. The publication is not a read Front-to-Back book. It contains actual documents which have been successfully implemented and still in use today by numerous organizations. The manual is organized to facilitate an Information Security Program to achieve regulatory compliance such as Sarbanes-Oxley, HIPAA, GLBA, and PCI/DSS. Adherence to ISO/27000 and the National Institute of Standards Technology (NIST) has been applied. The publication interacts with business continuity and disaster recovery planning through a business impact assessment tool.
How to Cheat at VoIP Security

How to Cheat at VoIP Security

Thomas Porter CISSP CCNP CCDA CCS; Michael Gough

Syngress Media,U.S.
2007
nidottu
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn’t Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator’s point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication Architectures Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. * The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. * Securing the Whole VoIP Infrastructure Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. * Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. * Understand Skype Security Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. * Get the Basics of a VoIP Security Policy Use a sample VoIP Security Policy to understand the components of a complete policy.
What Killed Sally

What Killed Sally

Slim and Cassy

Covenant Books
2018
pokkari
The Green Tree Campers of America youth organization leads camping expeditions to educate their young--mostly city-raised members--in outdoor skills, and PSL Ranch in Central Texas is one of their favorite locations. Although this ranchland is beautiful and full of interesting wildlife, it can also be quite dangerous for the unprepared. Due to "a few" lethal incidents involving campers named Sally, PSL ranch hands created this informational safety guide to avert injury, maiming, or death for those camping in this remote Texas ranchland. "Why Sally? What did Sally ever do to you?" these questions are often asked of ranch hands by visitors or during interrogations by law enforcement officers following an incident. The simple answer is, "Why not Sally?"What Killed Sally is a hilarious, politically incorrect, and somewhat twisted collection of ways Sally meets her maker while camping on a remote Central Texas ranch. Fully illustrated, What Killed Sally provides information on each incident while including interesting and sometimes useless facts on the local wildlife, fauna, and inhabitants. There's even a bonus section with some scrumptious recipes that keep GTCA campers well-fed. Based on actual locations and the ranchers that manage the land, What Killed Sally provides all the information you'll need to survive the Central Texas outdoors should you decide to hike or camp in this desolate wilderness. Had Sally read this safety guide, it may have saved her life.
Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification (CMMC)

Mark a Russo Cissp-Issap-Ceh

Independently Published
2019
pokkari
**This is the 2021 UPDATE...we have clarified even more about ongoing CMMC development and have added a hard copy version, if needed**Changes include: 1) The latest FAQs and expectations for 2020 and beyond CMMC implementation efforts, 2) alignment of security controls with the most recent CMMC version 1.0 release, and 3) addition of sample control write-ups for inclusion in company Systems Security Plans and Cybersecurity policies. This manual is created to help the small and big business owner in meeting the newest in cybersecurity contracting requirements to conduct business with the Department of Defense (DOD). The CMMC is a wide-ranging certification process with security controls most aligned with federal National Institute of Standards and Technology (NIST) cybersecurity guidance. The gravest weakness of these security controls is that they tell you what to do, but not how to do them. That is the purpose of this book. It provides the how-to best approach and answer the security control or at least where to proceed for how to fully implement the stated cybersecurity measure. The requirement to protect information and data is not just limited to the financial services, insurance, and health care sectors. It is difficult to identify a federal or industrial sector that escapes some responsibility to protect its electronic data. Indeed, some areas deal with more sensitive information, so it is not a surprise that the DOD recently took steps to have its contractors provide "adequate security" for "Controlled Unclassified Information (CUI). CMMC is in its early throes of its roll out. This is a first edition where the author's over 20 years in cybersecurity controls and security engineering is intended to help. Don't expect DOD to be ready for a while. This book will help you and your IT staff start the challenge of CMMC.This manual is created to help the small and big business owner in meeting the newest in cybersecurity contracting requirements to conduct business with the Department of Defense (DOD). The CMMC is a wide-ranging certification process with security controls most aligned with federal NIST standards. The gravest weakness of these security controls is that the tell you what to do, but not how to do them. That is the purpose of this book. It provides the how-to best approach and answer the security control or at least where to proceed for how to fully implement the stated cybersecurity measure.The requirement to protect information and data is not just limited to the financial services, insurance, and health care sectors. It is hard to identify a federal or industrial sector that escapes some responsibility to protect its electronic data. Indeed, some areas deal with more sensitive information, so it is not a surprise that the DOD recently took steps to have its contractors provide "adequate security" for "covered defense information (CDI)," which includes Controlled Unclassified Information (CUI).
Texas Senate Bill (TXSB) 820 & NIST 800-171

Texas Senate Bill (TXSB) 820 & NIST 800-171

Mark a Russo Cissp-Issap Ceh

Independently Published
2019
pokkari
Texas Senate Bill 820 Goes Live....NIST 800-171 is NOT just about the protection of personal and sensitive information, it is about positive control of information to only those with the proper need to know. This book is designed as a how-to book for Educational Institutions (EI) in the State of Texas, their leaders, and cybersecurity professionals to protect sensitive data as mandated under current Texas Law, Texas Senate Bill (TXSB) 820. It provides clear guidance on formulating an environment of security and creating a cybersecurity policy pursuant to TXSB 820.This book is written as a step-by-step approach leveraging the National Institute of Standards and Technology (NIST) 800-171 framework. Not all controls need to be addressed immediately but must be documented, monitored, and managed during the life of the system and data housed within a schools', colleges', or universities' data centers. There is still much more work that needs to be done in the area of cybersecurity. We are constantly reminded of ongoing intrusions to both public and private sector websites. What we do here, unlike so many books and articles, is that we describe the "how" to fix the specific control. While the challenges are many and ever-changing, the objective of this book is to provide you an initial start-point with many direction to protect not just personal data but the overall sensitive data of schools--K--12, colleges, universities, and State research facilities alike.