|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1126217569 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
191116s2019 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MERUC
|d OCLCQ
|d KMS
|d LOA
|d OCLCO
|d OCLCF
|d YDX
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1125365277
|
020 |
|
|
|a 9781944480554
|
020 |
|
|
|a 1944480552
|
035 |
|
|
|a (OCoLC)1126217569
|z (OCoLC)1125365277
|
050 |
|
4 |
|a TK5105.875.I57
|b .S374 2020
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schreider, Tari.
|
245 |
1 |
0 |
|a Building an Effective Cybersecurity Program, 2nd Edition :
|b a Security Manager's Handbook /
|c Tari Schreider.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Brooksfield :
|b Rothstein Associates, Incorporated,
|c 2019.
|
300 |
|
|
|a 1 online resource (408 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Designing a cybersecurity program -- Establishing a foundation of governance -- Building a cyber threat, vulnerability detection, and intelligence capability -- Building a cyber risk management capability -- Implementing a defense-in-depth strategy -- Applying service management to cybersecurity programs -- Cybersecurity program design toolkit.
|
520 |
|
|
|a You are either part of the digital economy or reliant upon it. With critical information assets at risk, each company requires a state-of-the-art cybersecurity program. But how can companies achieve the best possible program? This book explores the process of developing an effective cybersecurity system.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Schreider, Tari.
|t Building an Effective Cybersecurity Program, 2nd Edition : A Security Manager's Handbook.
|d Brooksfield : Rothstein Associates, Incorporated, ©2019
|z 9781944480530
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5965808
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5965808
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16517700
|
994 |
|
|
|a 92
|b IZTAP
|