Cargando…

Cyber Security: Essential principles to secure your organisation

Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.

Detalles Bibliográficos
Autor principal: Calder, Alan
Formato: eBook
Idioma:Inglés
Publicado: ITGP 2020.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1153985158
003 OCoLC
005 20231017213018.0
006 m o d |
007 cr |||||||||||
008 200310s2020 enk o 000 0 eng d
040 |a UKAHL  |b eng  |c UKAHL  |d EBLCP  |d UKAHL  |d OCLCQ  |d HF9 
019 |a 1151197042 
020 |a 9781787782105  |q (e-book) 
020 |a 1787782107 
035 |a (OCoLC)1153985158  |z (OCoLC)1151197042 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Calder, Alan. 
245 1 0 |a Cyber Security: Essential principles to secure your organisation  |c Calder, Alan. 
260 |b ITGP  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
505 0 |a Cover -- Title -- Copyright -- About the Author -- Contents -- Introduction -- Chapter 1: Information security and cyber security -- Laws, regulations and contracts -- Chapter 2: Threats and vulnerabilities -- Technical threats -- Defending against malware -- Hacking -- Insecure configuration -- Chapter 3: Security by design -- Example: TalkTalk data breach -- Chapter 4: Human threats -- Social engineering -- Staying safe online -- Remote working -- Example: WannaCry -- Chapter 5: Physical threats -- Defence in depth -- Physical security and mobile devices -- Example: KVM attacks 
505 8 |a Chapter 6: Third-party threats -- Supply chain threats -- Example: Target data breach -- Chapter 7: Securing the organisation -- Risk management -- Controls -- Chapter 8: Incident response and management -- Continuity -- Chapter 9: Standards and frameworks -- Taking the first steps -- Chapter 10: Conclusion -- Further reading 
520 |a Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
776 0 8 |i Print version:  |a Calder, Alan  |t Cyber Security: Essential Principles to Secure Your Organisation  |d Ely : IT Governance Ltd,c2020 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781787782112/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37386659 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37370512 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6176700 
994 |a 92  |b IZTAP