Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyber intelligence-driven risk/ by Richard O. Moore III.
Reminder of title:
how to build and use cyber intelligence for business risk decisions /
Author:
Moore, Richard O.,
Published:
Hoboken, NJ :Wiley, : c2021.,
Description:
1 online resource.
Subject:
Business enterprises - Security measures. -
Online resource:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942
ISBN:
9781119676942
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
Moore, Richard O.,III,1971-
Cyber intelligence-driven risk
how to build and use cyber intelligence for business risk decisions /[electronic resource] :by Richard O. Moore III. - Hoboken, NJ :Wiley,c2021. - 1 online resource.
Includes bibliographical references and index.
"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--
ISBN: 9781119676942Subjects--Topical Terms:
913112
Business enterprises
--Security measures.
LC Class. No.: HD61.5 / .M66 2021
Dewey Class. No.: 658.15/5
Cyber intelligence-driven risk = how to build and use cyber intelligence for business risk decisions /
LDR
:01929cmm a2200265 a 4500
001
2338547
003
OCoLC
005
20210205095015.5
006
m o d
007
cr cnu---unuuu
008
240605s2021 nju ob 001 0 eng
020
$a
9781119676942
$q
(electronic bk.)
020
$a
1119676940
$q
(electronic bk.)
020
$z
9781119676843
$q
(hbk.)
035
$a
1183399244
040
$a
DLC
$b
eng
$c
DLC
$d
OCLCO
$d
OCLCF
$d
N
$d
YDX
$d
TEFOD
$d
DG1
$d
TOH
041
0
$a
eng
050
0 0
$a
HD61.5
$b
.M66 2021
082
0 0
$a
658.15/5
$2
23
100
1
$a
Moore, Richard O.,
$c
III,
$d
1971-
$3
3674561
245
1 0
$a
Cyber intelligence-driven risk
$h
[electronic resource] :
$b
how to build and use cyber intelligence for business risk decisions /
$c
by Richard O. Moore III.
260
$a
Hoboken, NJ :
$b
Wiley,
$c
c2021.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
520
$a
"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--
$c
Provided by publisher.
588
$a
Description based on print version record.
650
0
$a
Business enterprises
$x
Security measures.
$3
913112
650
0
$a
Data protection.
$3
590548
650
0
$a
Cyber intelligence (Computer security)
$v
Congresses.
$3
2074226
650
0
$a
Risk management.
$3
540477
856
4 0
$u
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119676942
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9463679
電子資源
11.線上閱覽_V
電子書
EB HD61.5 .M66 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login