Products related to Cybersecurity:
-
Cybersecurity
An accessible guide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and cyber assistants.The more connected our computer systems, the more exposed they are to cyber attacks--attempts to steal data, corrupt software, disrupt operations, and even physically damage hardware and network infrastructures.In this volume of the MIT Press Essential Knowledge series, cybersecurity expert Duane Wilson offers an accessible guide to cybersecurity issues for everyday users, describing risks associated with internet use, modern methods of defense against cyber attacks, and general principles for safer internet use. Wilson describes the principles that underlie all cybersecurity defense: confidentiality, integrity, availability, authentication, authorization, and non-repudiation (validating the source of information).He explains that confidentiality is accomplished by cryptography; examines the different layers of defense; analyzes cyber risks, threats, and vulnerabilities; and breaks down the cyber kill chain and the many forms of malware.He reviews some online applications of cybersecurity, including end-to-end security protection, secure ecommerce transactions, smart devices with built-in protections, and blockchain technology.Finally, Wilson considers the future of cybersecurity, discussing the continuing evolution of cyber defenses as well as research that may alter the overall threat landscape.
Price: 15.99 £ | Shipping*: 3.99 £ -
Cybersecurity
If you want to avoid getting hacked, having your information spread and risking financial loss, then keep reading...Do you create tons of accounts you will never again visit?Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?Does your password contain a sequence of numbers, such as “123456”?Do you automatically click all links and download all email attachments coming from your friends?This book will show you just how incredibly lucky you are that nobody's hacked you before.With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.Here’s just a tiny fraction of what you’ll discover:How the internet is held together with a pinky swear,How hackers use raunchy photos to eke out private information,Examples of preposterous social engineering attacks,Equally preposterous defense from those attacks,How people in charge don't even realize what hacking means,How there's only one surefire way to protect against hacking,Research on past, present, and future hacking methods,Difference between good and bad hackers,How to lower your exposure to hacking,Why companies pester you to attach a phone number to an account,Why social media is the most insecure way to spend your afternoon,And much, much more,So if you want to learn more about Cybersecurity, scroll up and click "add to cart"!
Price: 29.99 £ | Shipping*: 0.00 £ -
Cybersecurity Law
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial.Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans.Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests. The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject.This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law.New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax.Readers of the third edition of Cybersecurity Law will also find: An all-new chapter focused on laws related to ransomware and the latest attacks that compromise the availability of data and systems New and updated sections on new data security laws in New York and Alabama, President Biden’s cybersecurity executive order, the Supreme Court’s first opinion interpreting the Computer Fraud and Abuse Act, American Bar Association guidance on law firm cybersecurity, Internet of Things cybersecurity laws and guidance, the Cybersecurity Maturity Model Certification, the NIST Privacy Framework, and more New cases that feature the latest findings in the constantly evolving cybersecurity law space An article by the author of this textbook, assessing the major gaps in U.S. cybersecurity law A companion website for instructors that features expanded case studies, discussion questions by chapter, and exam questions by chapter Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science.It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields, as well as academic and corporate libraries that support these professions.
Price: 89.95 £ | Shipping*: 0.00 £ -
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter.Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios.Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment.This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.Learn security and surveillance fundamentalsSecure and protect remote access and devicesUnderstand network topologies, protocols, and strategiesIdentify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Price: 33.00 £ | Shipping*: 0.00 £
-
How is the cybersecurity at Nextcloud?
Nextcloud takes cybersecurity very seriously and has implemented a range of security measures to protect user data. This includes end-to-end encryption, two-factor authentication, and regular security audits. Additionally, Nextcloud has a dedicated security team that actively monitors and responds to any potential security threats. Overall, Nextcloud's cybersecurity measures are robust and designed to keep user data safe and secure.
-
Where can I study IT security/cybersecurity?
You can study IT security/cybersecurity at various universities and colleges around the world that offer specialized programs in this field. Some well-known institutions known for their cybersecurity programs include Carnegie Mellon University, University of Maryland, Purdue University, and University of Southern California in the United States, as well as University of Oxford and University of Cambridge in the United Kingdom. Additionally, there are online platforms like Coursera, Udemy, and edX that offer courses and certifications in IT security/cybersecurity for those looking for more flexible and accessible options.
-
Is SSH a must-have for cybersecurity?
Yes, SSH (Secure Shell) is considered a must-have for cybersecurity. It provides a secure way to access and manage remote systems, encrypting data and providing authentication to prevent unauthorized access. SSH helps protect against eavesdropping, man-in-the-middle attacks, and other security threats that can compromise sensitive information. By using SSH, organizations can ensure secure communication and data transfer, making it an essential tool for maintaining cybersecurity.
-
"Does anyone work in cybersecurity IT security?"
Yes, there are many professionals who work in cybersecurity and IT security. These professionals are responsible for protecting computer systems, networks, and data from cyber threats such as hacking, malware, and data breaches. They work in various industries including government, finance, healthcare, and technology, and play a crucial role in safeguarding sensitive information and maintaining the integrity of digital infrastructure.
Similar search terms for Cybersecurity:
-
Cybersecurity Law
This book provides a relatively comprehensive examination of cybersecurity related laws that would be helpful for lawyers, law students, and Chief Information Security Officers (CISOs) and other cybersecurity and privacy professionals. The book outlines and details the U.S. federal sectoral approach to cybersecurity, such as covering the Gramm-Leach-Bliley Act and regulations, and the Health Insurance Portability and Accountability Act Security Rule, as well as an examination of state laws impacting cybersecurity, such as data breach notification, privacy and state education laws. International issues as well as specific topics such as ransomware and the Internet of things are addressed. Notably, the book provides a review of the role of the cybersecurity professional, risk assessment as well as the National Institute of Standards and Technology (NIST) risk assessment framework, and laws related to hacking.
Price: 161.00 £ | Shipping*: 0.00 £ -
CompTIA Cybersecurity Analyst (CySA+) CS0-003 Certification Training
CompTIA CySA+ : Become A SOC AnalystEmbark on a transformative journey towards becoming a proficient SOC Analyst with our comprehensive course designed to prepare you for the CompTIA CySA+ certification (CS0-003). This certification is not just a milestone but a gateway to a career path that is dynamic, in-demand, and critical in the landscape of cybersecurity.Course OverviewOur course is meticulously crafted to equip you with the knowledge and skills required to excel as a SOC Analyst. You will delve into the SOC Analyst job description, understand the SOC Analyst meaning, and explore the SOC Analyst requirements. The curriculum is aligned with the latest industry standards and best practices, ensuring that you are well-prepared for real-world challenges.What is a SOC Analyst?A SOC Analyst, or Security Operations Center Analyst, is a vital member of any cybersecurity team. They are the first responders to cyber incidents, providing threat and vulnerability analysis, investigating and documenting security issues, and responding to emerging trends in real-time. SOC Analysts are the sentinels in the digital realm, ensuring that cyber threats are identified, assessed, and neutralized effectively.Module 1 – CompTIA CySA+ CS0-003 BasicsIn the first module, learners are introduced to the essentials of the CompTIA CySA+ certification, including the scope and objectives of the exam. The module sets the stage for a cybersecurity career, highlighting the certification’s role in establishing a strong foundation for those aiming to become SOC analysts. It also touches on the importance of the certification for meeting Department of Defense employment criteria, emphasizing its value in the cybersecurity field.Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security OperationsThis module dives into the heart of security operations, covering the architecture of systems and networks from a security perspective. Learners will gain insights into the analysis of log files and operating systems, and the significance of network architecture in SOC operations. The module also explores identity and access management, encryption, and the handling of sensitive data. Additionally, it provides practical knowledge on identifying and responding to various cyber threats, the use of specialized tools for threat detection, and the basics of threat intelligence and threat hunting.Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability ManagementLearners will explore the comprehensive process of vulnerability management, including techniques for discovering and scanning vulnerabilities and assets. The module covers the interpretation of industry-standard scoring systems for vulnerabilities, the use of databases for tracking, and strategies for mitigating known security issues. It also delves into the principles of risk management and threat modeling, as well as the importance of secure coding practices within the software development lifecycle.Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and ManagementThe focus of this module is on the strategies and frameworks for effective incident response and management. Learners will understand the stages of the cyber kill chain and other attack methodologies, and how to apply them in real-world scenarios. The module covers the full spectrum of incident response, from detection and analysis to recovery, and emphasizes the importance of standardized processes for post-incident activities.Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and CommunicationEffective communication and reporting are crucial in SOC operations, and this module addresses the skills needed to report vulnerabilities, comply with regulations, and overcome barriers to remediation. Learners will understand how to develop and use metrics and KPIs to measure security posture, and how to communicate incident response activities to stakeholders. The module also stresses the importance of conducting thorough root cause analysis and documenting lessons learned for continuous improvement.Module 6 – CompTIA CySA+ CS0-003 – Course CloseoutThe concluding module prepares learners for the certification exam with practice questions and an overview of the exam process. It also discusses the importance of continuing education in the ever-evolving field of cybersecurity and provides guidance on maintaining the CompTIA certification and advancing in the cybersecurity career path.By integrating the clustered keywords throughout these summaries, the content is optimized to address the various aspects of becoming a SOC Analyst, the roles and responsibilities involved, and the career path that follows certification.Certification PathThe CompTIA CySA+ certification is a globally recognized credential that validates your expertise in cybersecurity. It is a crucial step in the SOC Analyst certification path and is highly regarded by employers worldwide. By obtaining this certification, you demonstrate a commitment to your career and a deep understanding of cybersecurity principles.SOC Analyst vs Cyber Security AnalystWhile the roles may overlap, a SOC Analyst focuses on monitoring, detecting, and responding to cybersecurity incidents within a Security Operations Center. In contrast, a Cyber Security Analyst may have a broader scope of responsibilities, including implementing security measures and providing overall protection against cyber threats.Career Path and Job ProspectsAs a certified SOC Analyst, you open doors to numerous opportunities in the cybersecurity domain. The SOC Analyst career path can lead to advanced roles such as Cybersecurity Engineer, Security Manager, or even a Chief Information Security Officer (CISO). According to the U.S. Bureau of Labor Statistics, the median annual wage for information security analysts is $99,730, reflecting the high demand and value of this role.The CompTIA CySA+ certification is designed for IT professionals looking to further their careers in cybersecurity and can qualify individuals for a variety of job roles within the field. Here is a list of job titles that align with the skills and knowledge validated by the CySA+ certification: Security Analyst SOC Analyst (Security Operations Center Analyst) Cybersecurity Analyst Threat Intelligence Analyst Vulnerability Analyst Incident Response Analyst Security Operations Specialist Network Security Analyst IT Security Analyst Compliance Analyst Security Engineer Information Security Specialist Cyber Defense Analyst Cybersecurity Incident Responder Information Assurance Analyst Cybersecurity Consultant Security Auditor Forensic Analyst Penetration Tester (with additional specialized training) Cybersecurity Coordinator These roles may vary by organization, and some positions may require additional experience or certifications beyond CySA+. However, the CySA+ certification provides a solid foundation for professionals aiming to enter or advance in these cybersecurity career paths. Becoming a SOC Analyst is a rewarding and challenging career move. With our course, you will gain the skills and knowledge to not only pass the CompTIA CySA+ certification but also to excel in the cybersecurity field. Take the first step towards a fulfilling career as a SOC Analyst and secure your future in the digital world.COURSE OUTLINEModule 1 - CompTIA CySA+ CS0-003 Basics1.1 Course Introduction1.2 Instructor Introduction1.3 What is CySA1.4 Exam Objectives1.5 Cybersecurity Pathway1.6 DoD Baseline CertficationModule 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations2.1 Domain 1 - Security Operations Overview2.2 System and Network Architecture Concepts in Security Operations2.3 Log Files2.4 Operating Systems2.5 Infrastructure Concepts2.6 Network Architecture2.7 Software Defined Networking2.8 Whiteboard Discussion - Network Architectures2.9 Identity and Access Management IAM Basics2.10 Demonstration - IAM2.11 Encryption2.12 Sensitive Data2.13 1.2 Analyze Indicators of Potentially Malicious Activity2.14 Network Attack2.15 Host Attacks2.16 Application Related Attacks2.17 Social Attacks2.18 Tools or Techniques to Determine Malicious Activity Overview2.19 Tools and Toolsets For Identifying Malicious Activity2.20 Common Techniques2.21 Programming Concerns2.22 Threat-Intelligence and Threat-Hunting Concepts Overview2.23 Threat Actors2.24 Tactics, Techniques and Procedures2.25 Confidence Levels IOC2.26 Collection Sources2.27 Threat Intelligence2.28 Cyber Response Teams2.29 Security Operations2.30 Standardized Processes and Operations2.31 Security Operations Tools and Toolsets2.32 Module 2 ReviewModule 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management3.1 Domain 2 - Vulnerability Management Overview3.2 Vulnerability Discovery and Scanning3.3 Asset Discovery and Scanning3.4 Industry Frameworks3.5 Mitigating Attacks3.6 CVSS and CVE3.7 Common Vulnerability Scoring System (CVSS) interpretation3.8 CVE Databases3.9 Cross Site Scripting (XSS)3.10 Vulnerability Response, Handling, and Management3.11 Control Types (Defense in Depth, Zero Trust)3.12 Patching and Configurations3.13 Attack Surface Management3.14 Risk Management Principles3.15 Threat Modeling3.16 Threat Models3.17 Secure Coding and Development (SDLC)3.18 Module 3 ReviewModule 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response andManagement4.1 Domain 3 - Incident Response and Management Overview4.2 Attack Methodology Frameworks4.3 Cyber Kill Chain4.4 Frameworks to Know4.5 Incident Response and Post Reponse4.6 Detection and Analysis4.7 Post Incident Activities4.8 Containment, Eradication and Recovery4.9 Module 4 ReviewModule 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication5.1 Domain 4 - Reporting and Communication Overview5.2 Reporting Vulnerabilities Overview5.2.1 Vulnerability Reporting5.3 Compliance Reports5.4 Inhibitors to Remediation5.5 Metrics and KPI's5.6 Incident Response Reporting and Communications Overview5.7 Incident Declaration5.8 Communication with Stakeholders5.9 Root Cause Analysis5.10 Lessons Learned and Incident Closure5.11 Module 5 ReviewModule 6 - CompTIA CySA+ CS0-003 - Course Closeout6.1 Course Closeout Overview6.2 Practice Questions6.3 Exam Process6.4 Continuing Education6.5 Course Closeout. LEARN365 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes andamp; Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Social Learning andamp; Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. Flash Cards andamp; Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high. Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
Price: 59.00 £ | Shipping*: £ -
Cybersecurity Readiness : A Holistic and High-Performance Approach
"Information security has become an important and critical component of every organization.In his book, Professor Chatterjee explains the challenges that organizations experience to protect information assets.The book sheds light on different aspects of cybersecurity including a history and impact of the most recent security breaches, as well as the strategic and leadership components that help build strong cybersecurity programs.This book helps bridge the gap between academia and practice and provides important insights that may help professionals in every industry." Mauricio Angee, Chief Information Security Officer, GenesisCare USA, Fort Myers, Florida, USA "This book by Dave Chatterjee is by far the most comprehensive book on cybersecurity management.Cybersecurity is on top of the minds of board members, CEOs, and CIOs as they strive to protect their employees and intellectual property.This book is a must-read for CIOs and CISOs to build a robust cybersecurity program for their organizations." Vidhya Belapure, Chief Information Officer, Huber Engineered Materials & CP Kelco, Marietta, Georgia, USA Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand.In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency in order to mitigate major threats to an organization’s well-being—and be prepared to act if the worst happens. With rapidly expanding attacks and evolving methods of attack, organizations are in a perpetual state of breach and have to deal with this existential threat head-on.Cybersecurity preparedness is a critical and distinctive competency, and this book is intended to help students and practitioners develop and enhance this capability, as individuals continue to be both the strongest and weakest links in a cyber defense system. In addition to providing the non-specialist with a jargon-free overview of cybersecurity threats, Dr. Chatterjee focuses most of the book on developing a practical and easy-to-comprehend management framework and success factors that will help leaders assess cybersecurity risks, address organizational weaknesses, and build a collaborative culture that is informed and responsive.Through brief case studies, literature review, and practical tools, he creates a manual for the student and professional alike to put into practice essential skills for any workplace.
Price: 46.00 £ | Shipping*: 0.00 £ -
Cybersecurity for Everyone
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us.We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times.This is not only (or perhaps even primarily) a technical challenge.It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it.Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully.Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
Price: 48.99 £ | Shipping*: 0.00 £
-
What are the advantages and disadvantages of cybersecurity?
The advantages of cybersecurity include protecting sensitive data from unauthorized access, preventing cyber attacks and data breaches, and ensuring the privacy and safety of individuals and organizations. It also helps in maintaining the integrity and reliability of digital systems and networks. However, the disadvantages of cybersecurity include the cost of implementing and maintaining robust security measures, the complexity of managing and updating security systems, and the potential for false positives and inconveniences for legitimate users. Additionally, there is a constant need to stay ahead of evolving cyber threats, which can be challenging for organizations.
-
How does one learn cybersecurity as a career changer?
As a career changer looking to learn cybersecurity, there are several steps you can take. First, consider pursuing formal education or certifications in cybersecurity to gain foundational knowledge and skills. Additionally, self-study through online resources, books, and tutorials can help you deepen your understanding of cybersecurity concepts. Networking with professionals in the field, attending industry events, and participating in cybersecurity challenges or competitions can also provide valuable hands-on experience and connections. Finally, consider seeking out internships or entry-level positions in cybersecurity to gain practical experience and further develop your skills.
-
What are the career opportunities in cybersecurity after completing training as an IT specialist?
After completing training as an IT specialist, there are various career opportunities in cybersecurity. Some of the roles include cybersecurity analyst, security consultant, penetration tester, security architect, and chief information security officer. These roles involve tasks such as monitoring and analyzing security threats, implementing security measures, conducting vulnerability assessments, and developing security strategies. With the increasing demand for cybersecurity professionals, there are ample opportunities for career growth and advancement in this field.
-
Where is the best place to learn hacking and cybersecurity?
The best place to learn hacking and cybersecurity is through reputable online platforms and educational institutions that offer courses and certifications in these fields. Websites like Coursera, Udemy, and Cybrary offer a wide range of courses taught by industry professionals. Additionally, universities and technical schools often have dedicated programs in cybersecurity and information technology that provide in-depth knowledge and hands-on experience. It's important to choose a program or course that is recognized and respected within the industry to ensure the quality of education and the value of the certification.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.