Back to Search results for [ null ]

Building an effective cybersecurity ...
Schreider, Tari,

Linked to FindBook      Google Book      Amazon      博客來     
  • Building an effective cybersecurity program
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Building an effective cybersecurity program/ Tari Schreider.
    Author: Schreider, Tari,
    Description: 1 online resource (408 p.)
    [NT 15003449]: Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
    Subject: Internet - Security measures. -
    Online resource: https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
    ISBN: 9781944480530
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login

(1)User name(Patron ID)Please enter your student ID number or passport number. (2)Password:Please enter the last four digits of your Patron ID.

.
.