Cargando…

Building a comprehensive IT security program : practical guidelines and best practices /

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wittkop, Jeremy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York, New York] : Apress, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn971245712
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170203s2016 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d OCLCA  |d OCLCF  |d CEF  |d KSU  |d OCLCQ  |d DEBBG  |d AU@  |d UAB  |d SFB  |d LQU  |d OCLCO  |d OCLCQ 
019 |a 1138753137 
020 |a 9781484220535 
020 |a 1484220536 
020 |z 9781484220528 
024 8 |a 10.1007/978-1-4842-2 
029 1 |a GBVCP  |b 897166043 
035 |a (OCoLC)971245712  |z (OCoLC)1138753137 
037 |a CL0500000826  |b Safari Books Online 
050 4 |a HD30.2 
082 0 4 |a 004  |2 23 
049 |a UAMI 
100 1 |a Wittkop, Jeremy,  |e author. 
245 1 0 |a Building a comprehensive IT security program :  |b practical guidelines and best practices /  |c Jeremy Wittkop. 
264 1 |a [New York, New York] :  |b Apress,  |c [2016] 
264 2 |a New York, NY :  |b Distributed by Springer Science+Business Media New York 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from cover (viewed January 31, 2017). 
500 |a Place of publication from publisher's Web site (viewed January 31, 2017). 
500 |a Includes index. 
505 0 |a Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- . 
520 |a This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop's security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business? 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures  |x Management. 
650 0 |a Computer security  |x Management. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures  |x Gestion. 
650 6 |a Sécurité informatique  |x Gestion. 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484220535/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP