Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
IT Security Controls = A Guide to Corporate Standards and Frameworks /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
IT Security Controls/ by Virgilio Viegas, Oben Kuyucu.
Reminder of title:
A Guide to Corporate Standards and Frameworks /
Author:
Viegas, Virgilio.
other author:
Kuyucu, Oben.
Description:
XXI, 354 p. 43 illus., 3 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-7799-7
ISBN:
9781484277997
IT Security Controls = A Guide to Corporate Standards and Frameworks /
Viegas, Virgilio.
IT Security Controls
A Guide to Corporate Standards and Frameworks /[electronic resource] :by Virgilio Viegas, Oben Kuyucu. - 1st ed. 2022. - XXI, 354 p. 43 illus., 3 illus. in color.online resource.
Chapter 1. The Cybersecurity Challenge -- Chapter 2. International Security Standards -- Chapter 3. Information Security Frameworks -- Chapter 4. IT Security Technical Controls -- Chapter 5. Corporate Information Security Processes and Services -- Chapter 6. People -- Chapter 7. Security Metrics -- Chapter 8. Case Studies -- Chapter 9. Security Testing and Attack Simulation Tools Appendix 1: IT Security Technical Controls, Processes, and Services Matrix Appendix 2: Information Security Certifications Appendix 3: Knowledge of Secure Acquisitions Appendix 4: Resource Library.
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you. What You Will Learn Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more.
ISBN: 9781484277997
Standard No.: 10.1007/978-1-4842-7799-7doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
IT Security Controls = A Guide to Corporate Standards and Frameworks /
LDR
:03565nam a22004215i 4500
001
1091077
003
DE-He213
005
20220512131204.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484277997
$9
978-1-4842-7799-7
024
7
$a
10.1007/978-1-4842-7799-7
$2
doi
035
$a
978-1-4842-7799-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Viegas, Virgilio.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1398609
245
1 0
$a
IT Security Controls
$h
[electronic resource] :
$b
A Guide to Corporate Standards and Frameworks /
$c
by Virgilio Viegas, Oben Kuyucu.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XXI, 354 p. 43 illus., 3 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. The Cybersecurity Challenge -- Chapter 2. International Security Standards -- Chapter 3. Information Security Frameworks -- Chapter 4. IT Security Technical Controls -- Chapter 5. Corporate Information Security Processes and Services -- Chapter 6. People -- Chapter 7. Security Metrics -- Chapter 8. Case Studies -- Chapter 9. Security Testing and Attack Simulation Tools Appendix 1: IT Security Technical Controls, Processes, and Services Matrix Appendix 2: Information Security Certifications Appendix 3: Knowledge of Secure Acquisitions Appendix 4: Resource Library.
520
$a
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you. What You Will Learn Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more.
650
0
$a
Data protection.
$3
557764
650
0
$a
Risk management.
$3
559158
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
IT Risk Management.
$3
1366666
650
2 4
$a
Principles and Models of Security.
$3
1225876
700
1
$a
Kuyucu, Oben.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1398610
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484277980
776
0 8
$i
Printed edition:
$z
9781484278000
776
0 8
$i
Printed edition:
$z
9781484284285
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7799-7
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login