語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building a Comprehensive IT Security...
~
SpringerLink (Online service)
Building a Comprehensive IT Security Program = Practical Guidelines and Best Practices /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Building a Comprehensive IT Security Program/ by Jeremy Wittkop.
其他題名:
Practical Guidelines and Best Practices /
作者:
Wittkop, Jeremy.
面頁冊數:
XIX, 195 p. 13 illus., 8 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-2053-5
ISBN:
9781484220535
Building a Comprehensive IT Security Program = Practical Guidelines and Best Practices /
Wittkop, Jeremy.
Building a Comprehensive IT Security Program
Practical Guidelines and Best Practices /[electronic resource] :by Jeremy Wittkop. - 1st ed. 2016. - XIX, 195 p. 13 illus., 8 illus. in color.online resource.
Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- .
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business?
ISBN: 9781484220535
Standard No.: 10.1007/978-1-4842-2053-5doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Building a Comprehensive IT Security Program = Practical Guidelines and Best Practices /
LDR
:03435nam a22003855i 4500
001
973868
003
DE-He213
005
20200704082102.0
007
cr nn 008mamaa
008
201211s2016 xxu| s |||| 0|eng d
020
$a
9781484220535
$9
978-1-4842-2053-5
024
7
$a
10.1007/978-1-4842-2053-5
$2
doi
035
$a
978-1-4842-2053-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Wittkop, Jeremy.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1268789
245
1 0
$a
Building a Comprehensive IT Security Program
$h
[electronic resource] :
$b
Practical Guidelines and Best Practices /
$c
by Jeremy Wittkop.
250
$a
1st ed. 2016.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
XIX, 195 p. 13 illus., 8 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- .
520
$a
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business?
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer security.
$3
557122
650
0
$a
Data structures (Computer science).
$3
680370
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484220528
776
0 8
$i
Printed edition:
$z
9781484220542
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2053-5
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入