Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cyber intelligence-driven risk/ by Richard O. Moore III.
Reminder of title:
how to build and use cyber intelligence for business risk decisions /
Author:
Moore, Richard O.,
Published:
Hoboken, NJ :Wiley, : c2021.,
Description:
1 online resource.
Subject:
Business enterprises - Security measures. -
Online resource:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942
ISBN:
9781119676942
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
Moore, Richard O.,III,1971-
Cyber intelligence-driven risk
how to build and use cyber intelligence for business risk decisions /[electronic resource] :by Richard O. Moore III. - Hoboken, NJ :Wiley,c2021. - 1 online resource.
Includes bibliographical references and index.
"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--
ISBN: 9781119676942Subjects--Topical Terms:
566349
Business enterprises
--Security measures.
LC Class. No.: HD61.5 / .M66 2021
Dewey Class. No.: 658.15/5
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
LDR
:01929cam a2200265 a 4500
001
1109866
003
OCoLC
005
20210205095015.5
006
m o d
007
cr cnu---unuuu
008
231110s2021 nju ob 001 0 eng
020
$a
9781119676942
$q
(electronic bk.)
020
$a
1119676940
$q
(electronic bk.)
020
$z
9781119676843
$q
(hbk.)
035
$a
1183399244
040
$a
DLC
$b
eng
$c
DLC
$d
OCLCO
$d
OCLCF
$d
N
$d
YDX
$d
TEFOD
$d
DG1
$d
TOH
041
0
$a
eng
050
0 0
$a
HD61.5
$b
.M66 2021
082
0 0
$a
658.15/5
$2
23
100
1
$a
Moore, Richard O.,
$c
III,
$d
1971-
$3
1421359
245
1 0
$a
Cyber intelligence-driven risk
$h
[electronic resource] :
$b
how to build and use cyber intelligence for business risk decisions /
$c
by Richard O. Moore III.
260
$a
Hoboken, NJ :
$b
Wiley,
$c
c2021.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
520
$a
"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--
$c
Provided by publisher.
588
$a
Description based on print version record.
650
0
$a
Business enterprises
$x
Security measures.
$3
566349
650
0
$a
Data protection.
$3
557764
650
0
$a
Cyber intelligence (Computer security)
$v
Congresses.
$3
1002572
650
0
$a
Risk management.
$3
559158
856
4 0
$u
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login