語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building an effective cybersecurity ...
~
Schreider, Tari,
FindBook
Google Book
Amazon
博客來
Building an effective cybersecurity program
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Building an effective cybersecurity program/ Tari Schreider.
作者:
Schreider, Tari,
面頁冊數:
1 online resource (408 p.)
內容註:
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
標題:
Internet - Security measures. -
電子資源:
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
ISBN:
9781944480530
Building an effective cybersecurity program
Schreider, Tari,
Building an effective cybersecurity program
[electronic resource] /Tari Schreider. - 2nd ed. - 1 online resource (408 p.)
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
Access restricted to authorized users and institutions.
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
Mode of access: World Wide Web.
ISBN: 9781944480530Subjects--Topical Terms:
590477
Internet
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HD30
Dewey Class. No.: 005
Building an effective cybersecurity program
LDR
:01927nmm a2200289 i 4500
001
2247684
006
m eo d
007
cr cn |||m|||a
008
211227t20192020ctu o 000 0 eng d
020
$a
9781944480530
020
$a
9781944480554
035
$a
ROTHSTEINB0000036
040
$a
iG Publishing
$b
eng
$c
iG Publishing
$e
rda
050
0 0
$a
HD30
082
0 0
$a
005
100
1
$a
Schreider, Tari,
$e
author.
$3
3512046
245
1 0
$a
Building an effective cybersecurity program
$h
[electronic resource] /
$c
Tari Schreider.
250
$a
2nd ed.
264
1
$a
Brookfield, Connecticut :
$b
Rothstein Publishing,
$c
2019.
264
4
$c
©2020
300
$a
1 online resource (408 p.)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
505
0
$a
Building an effective cybersecurity program, 2nd edition -- Dedication -- Acknowledgments -- Preface -- Why a Second Edition? -- Foreword -- Contents -- Introduction -- Chapter 1: Designing a Cybersecurity Program -- Chapter 2: Establishing a Foundation of Governance -- Chapter 3: Building a Cyber Threat, Vulnerability Detection, and Intelligence Capability -- Chapter 4: Building a Cyber Risk Management Capability -- Chapter 5: Implementing a Defense-in-Depth Strategy -- Chapter 6: Applying Service Management to Cybersecurity Programs -- Chapter 7: Cybersecurity Program Design Toolkit -- Appendix A: Useful Checklists and Information -- Index -- Credits -- About the Author.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program?
538
$a
Mode of access: World Wide Web.
650
0
$a
Internet
$x
Security measures.
$3
590477
655
4
$a
Electronic books.
$2
lcsh
$3
542853
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/ROTHSTEINB0000036.html
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9407619
電子資源
11.線上閱覽_V
電子書
EB HD30
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入