Building an Effective Security Program / (Record no. 84413)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06571nam a22009135i 4500 |
001 - CONTROL NUMBER | |
control field | 9781501506529 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730161523.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210830t20202020gw fo d z eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781501506529 |
041 0# - LANGUAGE CODE | |
Language code of text/sound track or separate title | |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Williams, Chris, |
245 10 - TITLE STATEMENT | |
Title | Building an Effective Security Program / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (XIX, 425 p.) |
520 ## - SUMMARY, ETC. | |
Summary, etc | Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset-Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management-Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense-Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations-Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training-Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff. Resilient IT Security-Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future. |
700 1# - AUTHOR 2 | |
Author 2 | Donaldson, Scott, |
700 1# - AUTHOR 2 | |
Author 2 | Siegel, Stanley, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1515/9781501506529 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.degruyter.com/isbn/9781501506529 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.degruyter.com/cover/covers/9781501506529.jpg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Berlin ; |
-- | Boston : |
-- | De Gruyter, |
-- | [2020] |
264 #4 - | |
-- | ©2020 |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
588 0# - | |
-- | Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Security / General. |
912 ## - | |
-- | 978-3-11-065906-1 De Gruyter English eBooks 2020 - UC |
-- | 2020 |
912 ## - | |
-- | 978-3-11-069627-1 DG Plus DeG Package 2020 Part 1 |
-- | 2020 |
912 ## - | |
-- | 978-3-11-069628-8 DG Ebook Package English 2020 |
-- | 2020 |
912 ## - | |
-- | 978-3-11-070471-6 EBOOK PACKAGE COMPLETE 2020 English |
-- | 2020 |
912 ## - | |
-- | 978-3-11-070481-5 EBOOK PACKAGE Engineering, Computer Sciences 2020 English |
-- | 2020 |
912 ## - | |
-- | EBA_CL_CHCOMSGSEN |
912 ## - | |
-- | EBA_DGALL |
912 ## - | |
-- | EBA_EBKALL |
912 ## - | |
-- | EBA_ECL_CHCOMSGSEN |
912 ## - | |
-- | EBA_EEBKALL |
912 ## - | |
-- | EBA_ESTMALL |
912 ## - | |
-- | EBA_STMALL |
912 ## - | |
-- | GBV-deGruyter-alles |
912 ## - | |
-- | PDA12STME |
912 ## - | |
-- | PDA13ENGE |
912 ## - | |
-- | PDA18STMEE |
912 ## - | |
-- | PDA5EBK |
912 ## - | |
-- | ZDB-23-DEI |
-- | 2020 |
912 ## - | |
-- | ZDB-23-DGG |
-- | 2020 |
No items available.