Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats /: how to build a successful cyberdefense program against advanced threats. ([2018])
- Record Type:
- Book
- Title:
- Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats /: how to build a successful cyberdefense program against advanced threats. ([2018])
- Main Title:
- Enterprise cybersecurity study guide : how to build a successful cyberdefense program against advanced threats
- Further Information:
- Note: Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
- Authors:
- Donaldson, Scott E
Siegel, Stanley G
Williams, Chris K
Aslam, Abdul - Contents:
- Part I: The Cybersecurity Challenge -- Chapter 1: Defining the Cybersecurity Challenge -- Chapter 2: Meeting the Cybersecurity Challenge -- Part II: A New Enterprise Cybersecurity Architecture -- Chapter 3: Enterprise Cybersecurity Architecture -- Chapter 4: Implementing Enterprise Cybersecurity -- Chapter 5: Operating Enterprise Cybersecurity -- Chapter 6: Enterprise Cybersecurity and the Cloud -- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building an Effective Defense -- Chapter 9: Responding to Incidents -- Chapter 10: Managing a Cybersecurity Crisis -- Part IV: Enterprise Cyber Defense Assessment -- Chapter 11: Assessing Enterprise Cybersecurity -- Chapter 12: Measuring a Cybersecurity Program -- Chapter 13: Mapping Against Cybersecurity Frameworks -- Part V: Enterprise Cybersecurity Program -- Chapter 14: Managing an Enterprise Cybersecurity Program -- Chapter 15: Looking to the Future -- Part VI: Appendices -- Appendix A: Sample Cybersecurity Policy -- Appendix B: Cybersecurity Operational Processes -- Appendix C: Object Measurement -- Appendix D: Cybersecurity Sample Assessment -- Appendix E: Cybersecurity Capability Value Scales.
- Publisher Details:
- New York, NY : Apress
- Publication Date:
- 2018
- Copyright Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer science
Computer security
Computer crimes -- Prevention
COMPUTERS -- Data Processing
Computer crimes -- Prevention
Computer security
Computer Science
Security
Data Encryption
Systems and Data Security
Computers -- Security -- General
Coding theory & cryptology
Computer security
Data protection
Data encryption (Computer science)
Electronic books
Electronic book - Languages:
- English
- ISBNs:
- 9781484232583
1484232585 - Related ISBNs:
- 9781484232576
1484232577 - Notes:
- Note: Online resource; title from PDF title page (EBSCO, viewed March 28, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.359997
- Ingest File:
- 01_322.xml