語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
IT security controls = a guide to co...
~
Viegas, Virgilio.
FindBook
Google Book
Amazon
博客來
IT security controls = a guide to corporate standards and frameworks /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
IT security controls/ by Virgilio Viegas, Oben Kuyucu.
其他題名:
a guide to corporate standards and frameworks /
作者:
Viegas, Virgilio.
其他作者:
Kuyucu, Oben.
出版者:
Berkeley, CA :Apress : : 2022.,
面頁冊數:
xxi, 354 p. :ill. (some col.), digital ;24 cm.
內容註:
Chapter 1. The Cybersecurity Challenge -- Chapter 2. International Security Standards -- Chapter 3. Information Security Frameworks -- Chapter 4. IT Security Technical Controls -- Chapter 5. Corporate Information Security Processes and Services -- Chapter 6. People -- Chapter 7. Security Metrics -- Chapter 8. Case Studies -- Chapter 9. Security Testing and Attack Simulation Tools Appendix 1: IT Security Technical Controls, Processes, and Services Matrix Appendix 2: Information Security Certifications Appendix 3: Knowledge of Secure Acquisitions Appendix 4: Resource Library.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-7799-7
ISBN:
9781484277997
IT security controls = a guide to corporate standards and frameworks /
Viegas, Virgilio.
IT security controls
a guide to corporate standards and frameworks /[electronic resource] :by Virgilio Viegas, Oben Kuyucu. - Berkeley, CA :Apress :2022. - xxi, 354 p. :ill. (some col.), digital ;24 cm.
Chapter 1. The Cybersecurity Challenge -- Chapter 2. International Security Standards -- Chapter 3. Information Security Frameworks -- Chapter 4. IT Security Technical Controls -- Chapter 5. Corporate Information Security Processes and Services -- Chapter 6. People -- Chapter 7. Security Metrics -- Chapter 8. Case Studies -- Chapter 9. Security Testing and Attack Simulation Tools Appendix 1: IT Security Technical Controls, Processes, and Services Matrix Appendix 2: Information Security Certifications Appendix 3: Knowledge of Secure Acquisitions Appendix 4: Resource Library.
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.) To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you. What You Will Learn Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more.
ISBN: 9781484277997
Standard No.: 10.1007/978-1-4842-7799-7doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / V54 2022
Dewey Class. No.: 005.8
IT security controls = a guide to corporate standards and frameworks /
LDR
:03220nmm a2200349 a 4500
001
2299422
003
DE-He213
005
20220323100002.0
006
m d
007
cr nn 008maaau
008
230324s2022 cau s 0 eng d
020
$a
9781484277997
$q
(electronic bk.)
020
$a
9781484277980
$q
(paper)
024
7
$a
10.1007/978-1-4842-7799-7
$2
doi
035
$a
978-1-4842-7799-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
V54 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
V656 2022
100
1
$a
Viegas, Virgilio.
$3
3596854
245
1 0
$a
IT security controls
$h
[electronic resource] :
$b
a guide to corporate standards and frameworks /
$c
by Virgilio Viegas, Oben Kuyucu.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
xxi, 354 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1. The Cybersecurity Challenge -- Chapter 2. International Security Standards -- Chapter 3. Information Security Frameworks -- Chapter 4. IT Security Technical Controls -- Chapter 5. Corporate Information Security Processes and Services -- Chapter 6. People -- Chapter 7. Security Metrics -- Chapter 8. Case Studies -- Chapter 9. Security Testing and Attack Simulation Tools Appendix 1: IT Security Technical Controls, Processes, and Services Matrix Appendix 2: Information Security Certifications Appendix 3: Knowledge of Secure Acquisitions Appendix 4: Resource Library.
520
$a
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.) To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you. What You Will Learn Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
IT Risk Management.
$3
3538812
650
2 4
$a
Principles and Models of Security.
$3
3382356
700
1
$a
Kuyucu, Oben.
$3
3596855
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7799-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9441314
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 V54 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入