Cargando…

Building an Effective Cybersecurity Program, 2nd Edition : a Security Manager's Handbook /

You are either part of the digital economy or reliant upon it. With critical information assets at risk, each company requires a state-of-the-art cybersecurity program. But how can companies achieve the best possible program? This book explores the process of developing an effective cybersecurity sy...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schreider, Tari
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Brooksfield : Rothstein Associates, Incorporated, 2019.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1126217569
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 191116s2019 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d MERUC  |d OCLCQ  |d KMS  |d LOA  |d OCLCO  |d OCLCF  |d YDX  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1125365277 
020 |a 9781944480554 
020 |a 1944480552 
035 |a (OCoLC)1126217569  |z (OCoLC)1125365277 
050 4 |a TK5105.875.I57  |b .S374 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Schreider, Tari. 
245 1 0 |a Building an Effective Cybersecurity Program, 2nd Edition :  |b a Security Manager's Handbook /  |c Tari Schreider. 
250 |a 2nd ed. 
260 |a Brooksfield :  |b Rothstein Associates, Incorporated,  |c 2019. 
300 |a 1 online resource (408 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Designing a cybersecurity program -- Establishing a foundation of governance -- Building a cyber threat, vulnerability detection, and intelligence capability -- Building a cyber risk management capability -- Implementing a defense-in-depth strategy -- Applying service management to cybersecurity programs -- Cybersecurity program design toolkit. 
520 |a You are either part of the digital economy or reliant upon it. With critical information assets at risk, each company requires a state-of-the-art cybersecurity program. But how can companies achieve the best possible program? This book explores the process of developing an effective cybersecurity system. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet  |x Security measures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 7 |a Internet  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Schreider, Tari.  |t Building an Effective Cybersecurity Program, 2nd Edition : A Security Manager's Handbook.  |d Brooksfield : Rothstein Associates, Incorporated, ©2019  |z 9781944480530 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5965808  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5965808 
938 |a YBP Library Services  |b YANK  |n 16517700 
994 |a 92  |b IZTAP