Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Building an effective cybersecurity ...
~
Schreider, Tari,
Linked to FindBook
Google Book
Amazon
博客來
Building an effective cybersecurity program
Record Type:
Electronic resources : Monograph/item
Title/Author:
Building an effective cybersecurity program/ Tari Schreider.
Author:
Schreider, Tari,
Description:
1 online resource (408 p.)
[NT 15003449]:
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
Subject:
Internet - Security measures. -
Online resource:
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
ISBN:
9781944480530
Building an effective cybersecurity program
Schreider, Tari,
Building an effective cybersecurity program
[electronic resource] /Tari Schreider. - 2nd ed. - 1 online resource (408 p.)
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
Access restricted to authorized users and institutions.
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
Mode of access: World Wide Web.
ISBN: 9781944480530Subjects--Topical Terms:
590477
Internet
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HD30
Dewey Class. No.: 005
Building an effective cybersecurity program
LDR
:01927nmm a2200289 i 4500
001
2247684
006
m eo d
007
cr cn |||m|||a
008
211227t20192020ctu o 000 0 eng d
020
$a
9781944480530
020
$a
9781944480554
035
$a
ROTHSTEINB0000036
040
$a
iG Publishing
$b
eng
$c
iG Publishing
$e
rda
050
0 0
$a
HD30
082
0 0
$a
005
100
1
$a
Schreider, Tari,
$e
author.
$3
3512046
245
1 0
$a
Building an effective cybersecurity program
$h
[electronic resource] /
$c
Tari Schreider.
250
$a
2nd ed.
264
1
$a
Brookfield, Connecticut :
$b
Rothstein Publishing,
$c
2019.
264
4
$c
©2020
300
$a
1 online resource (408 p.)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
505
0
$a
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
538
$a
Mode of access: World Wide Web.
650
0
$a
Internet
$x
Security measures.
$3
590477
655
4
$a
Electronic books.
$2
lcsh
$3
542853
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9407619
電子資源
11.線上閱覽_V
電子書
EB HD30
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login