語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing the enterprise = a practica...
~
Jha, GS.
FindBook
Google Book
Amazon
博客來
Securing the enterprise = a practical guide for CISOs, CXOs, and IT security professionals /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Securing the enterprise/ by GS Jha.
其他題名:
a practical guide for CISOs, CXOs, and IT security professionals /
作者:
Jha, GS.
出版者:
Berkeley, CA :Apress : : 2025.,
面頁冊數:
xix, 322 p. :ill., digital ;24 cm.
內容註:
Part 1: Foundations of Cybersecurity -- Chapter 1: Introduction to Cybersecurity -- Chapter 2: Core Cybersecurity Concepts -- Chapter 3: The Threat Landscape -- Part 2: The Role of Leaders in Cybersecurity -- Chapter 4: The Role of CXOs & Executive Leaders -- Chapter 5: The Role of the Board of Directors -- Chapter 6: The CISO Role & Responsibilities -- Chapter 7: Leadership & Communication -- Chapter 8: CISO Skills & Competencies -- Part 3: Cybersecurity Frameworks & Regulations -- Chapter 9: Key Cybersecurity Frameworks -- Chapter 10: Compliance & Regulations -- Chapter 11: Implementing a Security Program -- Part 4: Advanced Topics in Cybersecurity -- Chapter 12: Cloud Security -- Chapter 13: Security Information & Event Management (SIEM) -- Chapter 14: AI & Machine Learning in Cybersecurity -- Chapter 15: IoT Security -- Chapter 16: Blockchain & Cryptocurrency Security -- Chapter 17: Zero Trust Architecture (ZTA) -- Part 5: Cybersecurity Tabletop Exercises (TTXs) & Case Studies -- Chapter 18: Cybersecurity Tabletop Exercises (TTXs) -- Chapter 19: Notable Cybersecurity Incidents & Lessons Learned -- Chapter 20: Future of Cybersecurity -- Chapter 21: Tabletop Exercise - A Critical Tool for Incident Preparedness -- Chapter 22: David vs. Goliath: Cybersecurity's Constant Struggle.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/979-8-8688-1654-3
ISBN:
9798868816543
Securing the enterprise = a practical guide for CISOs, CXOs, and IT security professionals /
Jha, GS.
Securing the enterprise
a practical guide for CISOs, CXOs, and IT security professionals /[electronic resource] :by GS Jha. - Berkeley, CA :Apress :2025. - xix, 322 p. :ill., digital ;24 cm.
Part 1: Foundations of Cybersecurity -- Chapter 1: Introduction to Cybersecurity -- Chapter 2: Core Cybersecurity Concepts -- Chapter 3: The Threat Landscape -- Part 2: The Role of Leaders in Cybersecurity -- Chapter 4: The Role of CXOs & Executive Leaders -- Chapter 5: The Role of the Board of Directors -- Chapter 6: The CISO Role & Responsibilities -- Chapter 7: Leadership & Communication -- Chapter 8: CISO Skills & Competencies -- Part 3: Cybersecurity Frameworks & Regulations -- Chapter 9: Key Cybersecurity Frameworks -- Chapter 10: Compliance & Regulations -- Chapter 11: Implementing a Security Program -- Part 4: Advanced Topics in Cybersecurity -- Chapter 12: Cloud Security -- Chapter 13: Security Information & Event Management (SIEM) -- Chapter 14: AI & Machine Learning in Cybersecurity -- Chapter 15: IoT Security -- Chapter 16: Blockchain & Cryptocurrency Security -- Chapter 17: Zero Trust Architecture (ZTA) -- Part 5: Cybersecurity Tabletop Exercises (TTXs) & Case Studies -- Chapter 18: Cybersecurity Tabletop Exercises (TTXs) -- Chapter 19: Notable Cybersecurity Incidents & Lessons Learned -- Chapter 20: Future of Cybersecurity -- Chapter 21: Tabletop Exercise - A Critical Tool for Incident Preparedness -- Chapter 22: David vs. Goliath: Cybersecurity's Constant Struggle.
Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK, and Zero Trust. The book blends executive strategy with hands-on cybersecurity methodologies, providing a holistic understanding for CXOs, CISOs, and IT security professionals. By exploring real-world case studies and breaches, such as SolarWinds and Colonial Pipeline, this book equips you with proactive defense strategies, governance insights, and the technical knowledge required to secure enterprise infrastructures effectively. What You Will Learn Align cybersecurity with business strategy and executive decision making Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and Zero Trust Respond to cyber incidents and build a resilient security culture Understand key cybersecurity principles, including threat intelligence and risk management Study advanced cybersecurity topics, including AI-driven threats, ransomware, and cloud security.
ISBN: 9798868816543
Standard No.: 10.1007/979-8-8688-1654-3doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / J43 2025
Dewey Class. No.: 005.8
Securing the enterprise = a practical guide for CISOs, CXOs, and IT security professionals /
LDR
:03520nmm a2200349 a 4500
001
2415052
003
DE-He213
005
20250926130517.0
006
m d
007
cr nn 008maaau
008
260205s2025 cau s 0 eng d
020
$a
9798868816543
$q
(electronic bk.)
020
$a
9798868816536
$q
(paper)
024
7
$a
10.1007/979-8-8688-1654-3
$2
doi
035
$a
979-8-8688-1654-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2025
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
J59 2025
100
1
$a
Jha, GS.
$3
3792169
245
1 0
$a
Securing the enterprise
$h
[electronic resource] :
$b
a practical guide for CISOs, CXOs, and IT security professionals /
$c
by GS Jha.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xix, 322 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part 1: Foundations of Cybersecurity -- Chapter 1: Introduction to Cybersecurity -- Chapter 2: Core Cybersecurity Concepts -- Chapter 3: The Threat Landscape -- Part 2: The Role of Leaders in Cybersecurity -- Chapter 4: The Role of CXOs & Executive Leaders -- Chapter 5: The Role of the Board of Directors -- Chapter 6: The CISO Role & Responsibilities -- Chapter 7: Leadership & Communication -- Chapter 8: CISO Skills & Competencies -- Part 3: Cybersecurity Frameworks & Regulations -- Chapter 9: Key Cybersecurity Frameworks -- Chapter 10: Compliance & Regulations -- Chapter 11: Implementing a Security Program -- Part 4: Advanced Topics in Cybersecurity -- Chapter 12: Cloud Security -- Chapter 13: Security Information & Event Management (SIEM) -- Chapter 14: AI & Machine Learning in Cybersecurity -- Chapter 15: IoT Security -- Chapter 16: Blockchain & Cryptocurrency Security -- Chapter 17: Zero Trust Architecture (ZTA) -- Part 5: Cybersecurity Tabletop Exercises (TTXs) & Case Studies -- Chapter 18: Cybersecurity Tabletop Exercises (TTXs) -- Chapter 19: Notable Cybersecurity Incidents & Lessons Learned -- Chapter 20: Future of Cybersecurity -- Chapter 21: Tabletop Exercise - A Critical Tool for Incident Preparedness -- Chapter 22: David vs. Goliath: Cybersecurity's Constant Struggle.
520
$a
Cybersecurity is no longer just an IT issue; it is a business-critical function requiring executive oversight and strategic implementation. This book offers a practical approach to cybersecurity leadership, risk management, and frameworks such as NIST, MITRE ATT&CK, and Zero Trust. The book blends executive strategy with hands-on cybersecurity methodologies, providing a holistic understanding for CXOs, CISOs, and IT security professionals. By exploring real-world case studies and breaches, such as SolarWinds and Colonial Pipeline, this book equips you with proactive defense strategies, governance insights, and the technical knowledge required to secure enterprise infrastructures effectively. What You Will Learn Align cybersecurity with business strategy and executive decision making Cover practical implementation of frameworks such as NIST CSF, ISO 27001, and Zero Trust Respond to cyber incidents and build a resilient security culture Understand key cybersecurity principles, including threat intelligence and risk management Study advanced cybersecurity topics, including AI-driven threats, ransomware, and cloud security.
650
0
$a
Computer security.
$3
540555
650
0
$a
Computers
$x
Access control.
$3
584008
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1654-3
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9520507
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 J43 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入