|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1282302724 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
211103s2021 nju o 001 0 eng d |
040 |
|
|
|a ITD
|b eng
|e rda
|e pn
|c ITD
|d ITD
|d N$T
|d UKMGB
|d OCLCF
|d UKAHL
|d OCLCO
|d ORMDA
|d WAU
|d OCLCO
|d IEEEE
|
015 |
|
|
|a GBC1E6477
|2 bnb
|
016 |
7 |
|
|a 020313505
|2 Uk
|
020 |
|
|
|a 9781119811251
|
020 |
|
|
|a 1119811252
|
020 |
|
|
|a 1119811244
|
020 |
|
|
|a 9781119811244
|q (electronic bk.)
|
020 |
|
|
|a 9781394176823
|q (electronic bk.)
|
020 |
|
|
|a 1394176821
|q (electronic bk.)
|
020 |
|
|
|z 9781119811237 (pbk.)
|
024 |
7 |
|
|a 10.1002/9781394176823
|2 doi
|
029 |
1 |
|
|a UKMGB
|b 020313505
|
035 |
|
|
|a (OCoLC)1282302724
|
037 |
|
|
|a 9781119811244
|b Wiley
|
037 |
|
|
|a 9781119811237
|b O'Reilly Media
|
037 |
|
|
|a 9932138
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Crawley, Kim,
|e author.
|
245 |
1 |
0 |
|a 8 steps to better security :
|b a simple cyber resilience guide for business /
|c Kim Crawley.
|
246 |
3 |
|
|a Eight steps to better security
|
264 |
|
1 |
|a Hoboken :
|b John Wiley & Sons, Inc.,
|c [2021]
|
300 |
|
|
|a 1 online resource (xx, 204 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ProQuest Ebook Central, viewed February 28, 2022).
|
520 |
|
|
|a "Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: foster a strong security culture that extends from the custodial team to the C-suite; build an effective security team, regardless of the size or nature of your business; comply with regulatory requirements, including general data privacy rules and industry-specific legislation; test your cybersecurity, including third-party penetration testing and internal red team specialists. Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries." --
|c Description provided by publisher.
|
505 |
0 |
|
|a Foreword -- Introduction -- Chapter 1 Step 1: Foster a Strong Security Culture -- Kevin Mitnick, Human Hacker Extraordinaire -- The Importance of a Strong Security Culture -- Hackers Are the Bad Guys, Right? -- What Is Security Culture? -- How to Foster a Strong Security Culture -- Security Leaders on Security Culture -- What Makes a Good CISO? -- The Biggest Mistakes Businesses Make When It Comes to Cybersecurity -- The Psychological Phases of a Cybersecurity Professional -- Chapter 2 Step 2: Build a Security Team -- Why Step 2 Is Controversial -- How to Hire the Right Security Team. . .the Right Way -- Security Team Tips from Security Leaders -- The "Culture Fit"-Yuck! -- Cybersecurity Budgets -- Design Your Perfect Security Team -- Chapter 3 Step 3: Regulatory Compliance
|
505 |
8 |
|
|a What Are Data Breaches, and Why Are They Bad? -- The Scary Truth Found in Data Breach Research -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California Consumer Privacy Act -- The Health Insurance Portability and Accountability Act -- The Gramm-Leach-Bliley Act -- Payment Card Industry Data Security Standard -- Governance, Risk Management, and Compliance -- More About Risk Management -- Threat Modeling -- Chapter 4 Step 4: Frequent Security Testing -- What Is Security Testing? -- Security Testing Types -- Security Audits -- Vulnerability Assessments Versus Penetration Testing -- Red Team Testing -- Bug Bounty Programs -- What's Security Maturity? -- The Basics of Security Audits and Vulnerability Assessments
|
505 |
8 |
|
|a Log Early, Log Often -- Prepare for Vulnerability Assessments and Security Audits -- A Concise Guide to Penetration Testing -- Penetration Testing Based on Network Knowledge -- Penetration Testing Based on Network Aspects -- Security Leaders on Security Maturity -- Security Testing Is Crucial -- Chapter 5 Step 5: Security Framework Application -- What Is Incident Response? -- Preparation -- Identification or Analysis -- Containment, Mitigation, or Eradication -- Recovery -- Post-incident -- Your Computer Security Incident Response Team -- Cybersecurity Frameworks -- NIST Cybersecurity Framework -- ISO 27000 Cybersecurity Frameworks -- CIS Controls -- COBIT Cybersecurity Framework -- Security Frameworks and Cloud Security -- Chapter 6 Step 6: Control Your Data Assets
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Computer networks
|x Management.
|2 fast
|0 (OCoLC)fst00872323
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Crawley, Kim.
|t 8 steps to better security.
|d Hoboken : John Wiley & Sons, Inc., [2022]
|z 9781119811237
|w (OCoLC)1272885750
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119811237/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39143296
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3004173
|
994 |
|
|
|a 92
|b IZTAP
|