|
|
|
|
LEADER |
00000cam a22000007 4500 |
001 |
OR_on1348490110 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
221022s2022 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d OCLCQ
|d ORMDA
|
020 |
|
|
|a 9780117093966
|
020 |
|
|
|a 0117093963
|
029 |
1 |
|
|a AU@
|b 000075033537
|
035 |
|
|
|a (OCoLC)1348490110
|
037 |
|
|
|a 9780117093966
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230301
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Moskowitz, David.
|
245 |
1 |
2 |
|a A Practitioner's Guide to Adapting the NIST Cybersecurity Framework
|
260 |
|
|
|a London :
|b The Stationery Office Ltd,
|c 2022.
|
300 |
|
|
|a 1 online resource (188 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro -- Copyright Page -- Contents -- Foreword -- Preface -- About the authors -- Acknowledgments -- 1 The journey -- 1.1 Using the book -- 1.2 For NIST Cybersecurity Professional students -- 1.3 The rest of the story -- 2 Be the menace within -- a proactive approach -- 2.1 Identify and prioritize business systems -- 2.2 Being the menace -- 2.3 Understanding strategy-risk -- 3 Systems: simple, complex, complicated, and resilient -- 3.1 Speaking in systems -- 3.2 Leverage, change, and adaptive resilience -- 3.3 Knowledge management and systems -- 3.4 Working at the edge of chaos
|
505 |
8 |
|
|a 4 Cybersecurity and the Digital Value Management System™ -- 4.1 Exploring the DVMS -- 4.2 A systems view of the CPD Model -- 5 Adapting the way we work -- 5.1 An adaptive way of working -- 5.2 A principled approach to creating, protecting, and delivering digital business value -- 5.3 Organizing to create, protect, and deliver (CPD) digital business value -- 5.4 The DVMS FastTrack approach -- 5.5 Agility and resilience (the CPD Model and cybersecurity) -- 6 Cybersecurity within a system -- 6.1 A systems approach to cybersecurity -- 6.2 Overview of the practice relationships within the DVMS
|
505 |
8 |
|
|a 6.3 Applying the DVMS FastTrack approach -- 7 Digital business risk management -- 7.1 Mental models and perspectives -- 7.2 Z-X Model capabilities, practice areas, and practices -- 7.3 Cybersecurity and Z-X Model capabilities -- 7.4 Applied GQM and QO-QM: The role of performance measurement -- 8 The DVMS as a scalable overlay -- 8.1 Scalability? How? -- 8.2 Continual innovation -- 8.3 Digital business risk and resilience -- Notes -- Glossary -- References
|
520 |
|
|
|a The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute's CPD Model, and existing digital business systems.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a National Institute of Standards and Technology (U.S.)
|
630 |
0 |
0 |
|a NIST Cybersecurity Framework.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
700 |
1 |
|
|a Nichols, David M.
|
776 |
0 |
8 |
|i Print version:
|a Moskowitz, David.
|t A Practitioner's Guide to Adapting the NIST Cybersecurity Framework.
|d London : The Stationery Office Ltd, ©2022
|z 9780117093959
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780117093966/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|