|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
JSTOR_on1393307471 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
230812s2023 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d YDX
|d ORMDA
|d EBLCP
|d JSTOR
|d N$T
|d UKMGB
|
015 |
|
|
|a GBC3I1290
|2 bnb
|
016 |
7 |
|
|a 021210253
|2 Uk
|
019 |
|
|
|a 1393206266
|a 1396124630
|
020 |
|
|
|a 9781787784406
|q (electronic bk.)
|
020 |
|
|
|a 1787784401
|q (electronic bk.)
|
020 |
|
|
|a 9781787784390
|q (electronic bk.)
|
020 |
|
|
|a 1787784398
|q (electronic bk.)
|
020 |
|
|
|a 9781787784413
|q (electronic bk.)
|
020 |
|
|
|a 178778441X
|q (electronic bk.)
|
020 |
|
|
|z 9781787784383
|
029 |
1 |
|
|a AU@
|b 000075017728
|
029 |
1 |
|
|a UKMGB
|b 021210253
|
035 |
|
|
|a (OCoLC)1393307471
|z (OCoLC)1393206266
|z (OCoLC)1396124630
|
037 |
|
|
|a 9781787784406
|b O'Reilly Media
|
037 |
|
|
|a 22573/cats5749552
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230815
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|e author.
|
245 |
1 |
0 |
|a Cyber Resilience
|h [electronic resource] :
|b Defence-In-depth Principles /
|c Alan Calder.
|
250 |
|
|
|a First edition.
|
260 |
|
|
|a Ely :
|b IT Governance Ltd,
|c 2023.
|
300 |
|
|
|a 1 online resource (142 p.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title -- Copyright -- About the Author -- Acknowledgments -- Contents -- Introduction -- Part 1: Security principles -- Chapter 1: The cyber threat landscape -- Chapter 2: Legal and contractual requirements -- Chapter 3: Key terms and concepts -- Chapter 4: Managing the risks -- Chapter 5: Three security pillars -- Chapter 6: Layers of defence in depth -- Chapter 7: Mapping the layers against the Part 2 reference controls -- Chapter 8: Implementation tips -- Part 2: Reference controls -- Chapter 9: Asset management -- Chapter 10: Board-level commitment and involvement
|
505 |
8 |
|
|a Chapter 11: Business continuity management -- Chapter 12: Configuration and patch management -- Chapter 13: Continual improvement process -- Chapter 14: Encryption -- Chapter 15: External certification/validation -- Chapter 16: Identity and access control -- Chapter 17: Incident response management -- Chapter 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications security -- Chapter 21: Physical and environmental security -- Chapter 22: Security monitoring -- Chapter 23: Security policies -- Chapter 24: Staff training and awareness
|
505 |
8 |
|
|a Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27: Vulnerability scanning and penetration testing -- GRC International Group PLC resources
|
520 |
|
|
|a This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan
|t Cyber Resilience
|d Ely : IT Governance Ltd,c2023
|z 9781787784383
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/jj.5806810
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30676962
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 20430014
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3658148
|
994 |
|
|
|a 92
|b IZTAP
|