Cargando…

Managing cybersecurity risk : case studies and solutions /

This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Reuvid, Jonathan (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Legend Business Books, 2018.
Edición:Edition 2.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1090301496
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 190321s2018 enk o 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OCLCF  |d YDX  |d EBLCP  |d OCLCO  |d LOA  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1041499424  |a 1158222251 
020 |a 9781787198906  |q (electronic bk.) 
020 |a 1787198901  |q (electronic bk.) 
020 |z 9781787198913 
020 |z 178719891X 
029 1 |a AU@  |b 000068986853 
035 |a (OCoLC)1090301496  |z (OCoLC)1041499424  |z (OCoLC)1158222251 
050 4 |a HD30.38 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Managing cybersecurity risk :  |b case studies and solutions /  |c edited by Jonathan Reuvid. 
250 |a Edition 2. 
264 1 |a London :  |b Legend Business Books,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Vendor-supplied metadata. 
520 |a This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost. 
505 0 |a Cover -- Title -- Copyright -- Contents -- Foreword -- Preface -- List of Contributors -- Introduction -- Part One Cybersecurity in the Information Age -- 1.1 Building Business Resilience -- 1.2 Enterprise Vulnerablity Scanning -- 1.3 Cybercrime -- Translating the Tech from the Floor to the Boardroom -- 1.4 Cybersecurity: Moving from Awareness to Understanding -- 1.5 How Cyber Criminals Make Money -- 1.6 If SMEs are the Life Blood of the British Economy, We've Cut an Artery -- Part Two Addressing the Management Issues -- 2.1 Managing Cyber Risk -- The Role of the Board -- 2.2 Activating the Human Firewall -The Leap from Knowing to Doing -- 2.3 The Resilient Organisation -- Are We Searching for Our "Phlogiston"? -- 2.4 An Action Plan for Response and Damage Containment -- 2.5 Addressing the Skills Shortage in Cybersecurity -- Part Three General Data Protection Regulation -- 3.1 GDPR -- A View from the Frontline -- 3.2 GDPR -- Introducing the UK Regime -- 3.3 Using Scenario Workshops to Prepare for GDPR and Other Legislation -- 3.4 GDPR -- Comparative International Regimes -- 3.5 Intrusion Detection System Evaluation Guide -- Part Four Innovative Tools for Cyber Threat Response -- 4.1 Identifying Affordable and Cost-effective Solutions -- 4.2 Detecting Ransomware with Unified Security -- 4.3 Petya Ransomwware Rapid Response Guide -- 4.4 The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World -- Part Five Cautionary Tales from the Frontline -- 5.1 The Power of Storytelling -- 5.2 How to Avoid That 'I Told You So' Moment -- 5.3 A Cuckoo in the Nest? -- 5.4 The Trouble with Contractors -- 5.5 Hacked into a Parallel Universe -- Contributors' Contacts. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Corporations  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sociétés  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Corporations  |x Security measures  |2 fast 
650 7 |a Data protection  |2 fast 
700 1 |a Reuvid, Jonathan,  |e editor. 
758 |i has work:  |a Managing cybersecurity risk (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH6CXk4GTMdr6kVcDMmPgq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Managing cybersecurity risk.  |b Edition 2.  |d London : Legend Business Books, 2018  |z 9781787198913  |z 178719891X  |w (OCoLC)994638306 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4876731  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4876731 
938 |a EBSCOhost  |b EBSC  |n 1517583 
938 |a YBP Library Services  |b YANK  |n 15546470 
994 |a 92  |b IZTAP