|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1228911382 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201211s2021 nju o 001 0 eng |
010 |
|
|
|a 2020055875
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d OCLCO
|d OCLCF
|d YDX
|d UKAHL
|d YDX
|d N$T
|d TEFOD
|d OCLCO
|d IEEEE
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781119700753
|q electronic book
|
020 |
|
|
|a 1119700752
|q electronic book
|
020 |
|
|
|a 1119700744
|q electronic book
|
020 |
|
|
|a 9781119700746
|q (electronic bk.)
|
020 |
|
|
|a 9781394174768
|q (electronic bk.)
|
020 |
|
|
|a 1394174764
|q (electronic bk.)
|
020 |
|
|
|z 9781119700739
|q hardcover
|
024 |
7 |
|
|a 10.1002/9781394174768
|2 doi
|
035 |
|
|
|a (OCoLC)1228911382
|
037 |
|
|
|a ABCC6CE8-669C-49AD-91F1-C829AE64EDF9
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9872307
|b IEEE
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a QA76.9.A25
|b C37 2021
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Castaldo, Chris,
|e author.
|
245 |
1 |
0 |
|a Start-up secure :
|b baking cybersecurity into your company from founding to exit /
|c Chris Castaldo.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley & Sons, Inc.,
|c [2021]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a "Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today's world. It will take them through landing their first A round of funding and then a successful exit. The book describes how to include security and privacy from the start and build a cyber resilient company. It will provide basic cybersecurity concepts, what steps to take at each stage of the startup's life, how baking in security drives the value proposition for the startup's target market, and how to scale cybersecurity within their organization without being an expert."--
|c Provided by publisher.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on April 20, 2021).
|
505 |
0 |
|
|a Foreword xv -- Preface xvii -- Acknowledgments xxi -- About the Author xxv -- Introduction 1 -- Part I Fundamentals -- Chapter 1: Minimum Security Investment for Maximum Risk Reduction 7 -- Communicating Your Cybersecurity 9 -- Email Security 10 -- Secure Your Credentials 12 -- SAAS Can Be Secure 14 -- Patching 15 -- Antivirus is Still Necessary but Goes by a Different Name 18 -- Mobile Devices 18 -- Summary 20 -- Action Plan 20 -- Notes 21 -- Chapter 2: Cybersecurity Strategy and Roadmap Development 23 -- What Type of Business is This? 24 -- What Types of Customers Will We Sell To? 24 -- What Types of Information Will the Business Consume? 25 -- What Types of Information Will the Business Create? 25 -- Where Geographically Will Business Be Conducted? 26 -- Building the Roadmap 26 -- Opening Statement 26 -- Stakeholders 27 -- Tactics 27 -- Measurability 27 -- Case Study 28 -- Summary 30 -- Action Plan 30 -- Note 30 -- Chapter 3: Secure Your Credentials 31 -- Password Managers 32 -- Passphrase 33 -- Multi-Factor Authentication 35 -- Entitlements 37 -- Key Management 38 -- Case Study 39 -- Summary 41 -- Action Plan 42 -- Notes 42 -- Chapter 4: Endpoint Protection 43 -- Vendors 44 -- Selecting an EDR 45 -- Managed Detection and Response 46 -- Case Study 49 -- Summary 50 -- Action Plan 51 -- Notes 51 -- Chapter 5: Your Office Network 53 -- Your First Office Space 54 -- Co-Working Spaces 57 -- Virtual Private Network 58 -- Summary 60 -- Action Plan 60 -- Notes 60 -- Chapter 6: Your Product in the Cloud 63 -- Secure Your Cloud Provider Accounts 65 -- Protect Your Workloads 66 -- Patching 67 -- Endpoint Protection 68 -- Secure Your Containers 69 -- Summary 70 -- Action Plan 70 -- Notes 71 -- Chapter 7: Information Technology 73 -- Asset Management 74 -- Identity and Access Management 76 -- Summary 77 -- Action Plan 78 -- Part II Growing the Team -- Chapter 8: Hiring, Outsourcing, or Hybrid 81 -- Catalysts to Hiring 82 -- Get the First Hire Right 83 -- Executive versus Individual Contributor 84 -- Recruiting 86 -- Job Descriptions 86 -- Interviewing 88 -- First 90 Days is a Myth 90 -- Summary 90 -- Action Plan 90 -- Note 91 -- Part III Maturation -- Chapter 9: Compliance 95 -- Master Service Agreements, Terms and Conditions, Oh My 96 -- Patch and Vulnerability Management 97 -- Antivirus 98 -- Auditing 98 -- Incident Response 99 -- Policies and Controls 100 -- Change Management 100 -- Encryption 101 -- Data Loss Prevention 101 -- Data Processing Agreement 102 -- Summary 102 -- Action Plan 103 -- Note 103 -- Chapter 10: Industry and Government Standards and Regulations 105 -- Open Source 106 -- OWASP 106 -- Center for Internet Security 20 106 -- United States Public 106 -- SOC 106 -- Retail 109 -- PCI DSS 109 -- SOX 111 -- Energy, Oil, and Gas 111 -- NERC CIP 111 -- ISA-62443-3-3 (99.03.03)-2013 112 -- Federal Energy Regulatory Commission 112 -- Department of Energy Cybersecurity Framework 112 -- Health 113 -- HIPAA 113 -- HITECH 114 -- HITRUST 114 -- Financial 114 -- FFIEC 114 -- FINRA 115 -- NCUA 115 -- Education 115 -- FERPA 115 -- International 116 -- International Organization for Standardization (ISO) 116 -- UL 2900 117 -- GDPR 117 -- Privacy Shield 118 -- UK Cyber Essentials 118 -- United States Federal and State Government 118 -- NIST 119 -- NISPOM 120 -- DFARS PGI 120 -- FedRAMP 120 -- FISMA 122 -- NYCRR 500 122 -- CCPA 122 -- Summary 123 -- Action Plan 123 -- Notes 124 -- Chapter 11: Communicating Your Cybersecurity Posture and Maturity to Customers 127 -- Certifications and Audits 128 -- Questionnaires 129 -- Shared Assessments 129 -- Cloud Security Alliance 130 -- Vendor Security Alliance 130 -- Sharing Data with Your Customer 131 -- Case Study 133 -- Summary 135 -- Action Plan 136 -- Notes 136 -- Chapter 12: When the Breach Happens 137 -- Cyber Insurance 138 -- Incident Response Retainers 139 -- The Incident 140 -- Tabletop Exercises 141 -- Summary 142 -- Action Plan 142 -- Note 142 -- Chapter 13: Secure Development 143 -- Frameworks 144 -- BSIMM 144 -- OpenSAMM 145 -- CMMI 145 -- Microsoft SDL 147 -- Pre-Commit 147 -- Integrated Development Environment 148 -- Commit 148 -- Build 149 -- Penetration Testing 149 -- Summary 150 -- Action Plan 150 -- Notes 151 -- Chapter 14: Third-Party Risk 153 -- Terms and Conditions 154 -- Should I Review This Vendor? 154 -- What to Ask and Look For 155 -- Verify DMARC Settings 156 -- Check TLS Certificates 157 -- Check the Security Headers of the Website 157 -- Summary 158 -- Action Plan 158 -- Note 159 -- Chapter 15: Bringing It All Together 161 -- Glossary 167 -- Index 181.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a New business enterprises.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Nouvelles entreprises.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a New business enterprises
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Castaldo, Chris.
|t Start-up secure
|d Hoboken, New Jersey : Wiley, [2021]
|z 9781119700739
|w (DLC) 2020055874
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119700739/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37736686
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302032304
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2903197
|
994 |
|
|
|a 92
|b IZTAP
|