Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress : Imprint: Apress,
2016.
|
Edición: | 1st ed. 2016. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Chapter 1: The Problem We Are Facing
- Chapter 2 : Protecting Critical Assets
- Chapter 3: Monetizing Risk
- Chapter 4: Security Intelligence Model
- Chapter 5: Incident Response Planning
- Chapter 6: The People Problem
- Chapter 7: Assigning Accountability
- Chapter 8: Shifting the Paradigm
- Chapter 9: The Definition of Insanity
- Chapter 10: Déjà Vu
- Chapter 11: The Information Security Community
- Chapter 12: Partnering with Governments
- .