語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building an effective cybersecurity ...
~
Schreider, Tari,
Building an effective cybersecurity program /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Building an effective cybersecurity program // Tari Schreider.
作者:
Schreider, Tari,
面頁冊數:
1 online resource (408 p.)
標題:
Internet - Security measures. -
電子資源:
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
ISBN:
9781944480530
Building an effective cybersecurity program /
Schreider, Tari,
Building an effective cybersecurity program /
Tari Schreider. - 2nd ed. - 1 online resource (408 p.)
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
Access restricted to authorized users and institutions.
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
Mode of access: World Wide Web.
ISBN: 9781944480530Subjects--Topical Terms:
567030
Internet
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HD30
Dewey Class. No.: 005
Building an effective cybersecurity program /
LDR
:01927nam a2200289 i 4500
001
1041734
006
m eo d
007
cr cn |||m|||a
008
211215t20192020ctu o 000 0 eng d
020
$a
9781944480530
020
$a
9781944480554
035
$a
ROTHSTEINB0000036
040
$a
iG Publishing
$b
eng
$c
iG Publishing
$e
rda
050
0 0
$a
HD30
082
0 0
$a
005
100
1
$a
Schreider, Tari,
$e
author.
$3
1341657
245
1 0
$a
Building an effective cybersecurity program /
$c
Tari Schreider.
250
$a
2nd ed.
264
1
$a
Brookfield, Connecticut :
$b
Rothstein Publishing,
$c
2019.
264
4
$c
©2020
300
$a
1 online resource (408 p.)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
505
0
$a
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
538
$a
Mode of access: World Wide Web.
650
0
$a
Internet
$x
Security measures.
$3
567030
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入