Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Building an effective cybersecurity ...
~
Schreider, Tari,
Building an effective cybersecurity program /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Building an effective cybersecurity program // Tari Schreider.
Author:
Schreider, Tari,
Description:
1 online resource (408 p.)
Subject:
Internet - Security measures. -
Online resource:
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
ISBN:
9781944480530
Building an effective cybersecurity program /
Schreider, Tari,
Building an effective cybersecurity program /
Tari Schreider. - 2nd ed. - 1 online resource (408 p.)
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
Access restricted to authorized users and institutions.
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
Mode of access: World Wide Web.
ISBN: 9781944480530Subjects--Topical Terms:
567030
Internet
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HD30
Dewey Class. No.: 005
Building an effective cybersecurity program /
LDR
:01927nam a2200289 i 4500
001
1041734
006
m eo d
007
cr cn |||m|||a
008
211215t20192020ctu o 000 0 eng d
020
$a
9781944480530
020
$a
9781944480554
035
$a
ROTHSTEINB0000036
040
$a
iG Publishing
$b
eng
$c
iG Publishing
$e
rda
050
0 0
$a
HD30
082
0 0
$a
005
100
1
$a
Schreider, Tari,
$e
author.
$3
1341657
245
1 0
$a
Building an effective cybersecurity program /
$c
Tari Schreider.
250
$a
2nd ed.
264
1
$a
Brookfield, Connecticut :
$b
Rothstein Publishing,
$c
2019.
264
4
$c
©2020
300
$a
1 online resource (408 p.)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
505
0
$a
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
538
$a
Mode of access: World Wide Web.
650
0
$a
Internet
$x
Security measures.
$3
567030
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login