|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1224365357 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
201128s2020 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d EBLCP
|d REDDC
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781119676911
|q (paperback)
|
020 |
|
|
|a 1119676916
|q (paperback)
|
035 |
|
|
|a (OCoLC)1224365357
|
050 |
|
4 |
|a HD61.5
|b .M66 2021
|
082 |
0 |
4 |
|a 658.47
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Moore, Richard O., III.
|
245 |
1 |
0 |
|a Cyber Intelligence-Driven Risk
|h [electronic resource] :
|b How to Build and Use Cyber Intelligence for Business Risk Decisions.
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2020.
|
300 |
|
|
|a 1 online resource (188 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Introduction -- Notes -- Chapter 1 Objectives of a Cyber Intelligence-Driven Risk Program -- Notes -- Chapter 2 Importance of Cyber Intelligence for Businesses -- Notes -- Chapter 3 Military to Commercial Viability of the CI-DR™ Program -- Notes -- Chapter 4 CI-DR™ Security Program Components -- Notes -- Chapter 5 Functional Capabilities of the CI-DRTM Program -- Notes -- Chapter 6 CI-DR™ Key Capability Next-Generation Security Operations Center -- Notes -- Chapter 7 CI-DR™ Key Capability Cyber Threat Intelligence
|
505 |
8 |
|
|a Notes -- Chapter 8 CI-DR™ Key Capability Forensic Teams -- Notes -- Chapter 9 CI-DR™ Key Capability Vulnerability Management Teams -- Notes -- Chapter 10 CI-DR™ Key Capability Incident Response Teams -- Notes -- Chapter 11 CI-DR™ Collection Components -- Notes -- Chapter 12 CI-DR™ Stakeholders -- Notes -- Conclusion -- Glossary -- About the Author and Chapter Authors -- Index -- EULA
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
6 |
|a Entreprises
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business enterprises
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a Cyber intelligence-driven risk (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGbCMDwbXDm3Thv8rMYPry
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Moore, Richard O., III
|t Cyber Intelligence-Driven Risk : How to Build and Use Cyber Intelligence for Business Risk Decisions
|d Newark : John Wiley & Sons, Incorporated,c2020
|z 9781119676843
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6403510
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6403510
|
994 |
|
|
|a 92
|b IZTAP
|