Cargando…

Data breaches : crisis and opportunity /

Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offer...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Davidoff, Sherri (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Addison-Wesley, [2020]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1124929617
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 191024s2020 maua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d YDX  |d OCLCQ 
020 |a 9780134507750 
020 |a 0134507754 
020 |z 9780134506784 
029 1 |a AU@  |b 000071520765 
035 |a (OCoLC)1124929617 
037 |a CL0501000078  |b Safari Books Online 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Davidoff, Sherri,  |e author. 
245 1 0 |a Data breaches :  |b crisis and opportunity /  |c Sherri Davidoff. 
264 1 |a Boston :  |b Addison-Wesley,  |c [2020] 
264 4 |c ©2020 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed October 24, 2019). 
504 |a Includes bibliographical references and index. 
520 |a Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You'll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Business  |x Data processing  |x Security measures. 
650 0 |a Computer crimes  |x Risk assessment. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Gestion  |x Informatique  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Évaluation du risque. 
650 7 |a Business  |x Data processing  |x Security measures.  |2 fast  |0 (OCoLC)fst00842307 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780135964255/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 18082071 
994 |a 92  |b IZTAP