Cargando…

Cyber intelligence-driven risk : how to build and use cyber intelligence for business risk decisions /

"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and att...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Moore, Richard O., III, 1971- (Autor)
Formato: Electrónico Audiom
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cim a2200000Mi 4500
001 OR_on1244273535
003 OCoLC
005 20231017213018.0
006 m h
007 cr una||||||||
007 sz usnnnn|||ed
008 210305s2021 njunnnn o z n eng d
040 |a TOH  |b eng  |e rda  |c TOH  |d OCLCF  |d OCLCQ 
020 |a 1469082705 
020 |a 9781469082707 
029 1 |a AU@  |b 000072056209 
035 |a (OCoLC)1244273535 
037 |a ECD2AE9F-F4A0-484A-90F4-C8C3CB1AD5D5  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 0 0 |a HD61.5  |b .M66 2021 
082 0 4 |a 658.15/5  |2 23 
049 |a UAMI 
100 1 |a Moore, Richard O.,  |c III,  |d 1971-  |e author. 
245 1 0 |a Cyber intelligence-driven risk :  |b how to build and use cyber intelligence for business risk decisions /  |c by Richard O. Moore III, MSIA, CISSP, CISM. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons,  |c [2021] 
300 |a 1 online resource (1 sound file) 
336 |a spoken word  |b spw  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a audio file  |2 rda 
500 |a Electronic audio file. 
511 0 |a Read by Walter Dixon. 
520 |a "The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--  |c Provided by publisher. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Security measures. 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Data protection. 
650 0 |a Risk management. 
650 7 |a Business enterprises  |x Security measures.  |2 fast  |0 (OCoLC)fst00842623 
650 7 |a Cyber intelligence (Computer security)  |2 fast  |0 (OCoLC)fst01893401 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Risk management.  |2 fast  |0 (OCoLC)fst01098164 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a OverDrive, Inc.,  |e distributor. 
776 0 8 |i Online version:  |a Moore, Richard O., III, 1971-  |t Cyber intelligence-driven risk  |d Hoboken, New Jersey : John Wiley & Sons, [2021]  |z 9781119676911  |w (DLC) 2020035541 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781469082707/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP