Building an Effective Security Program
Autor Chris Williams, Scott Donaldson, Stanley Siegelen Limba Engleză Paperback – 20 sep 2020
This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:
- IT Security Mindset--Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks.
- Risk Management--Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk.
- Effective Cyberdefense--Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data.
- Cyber Operations--Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done.
- IT Security Awareness and Training--Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff.
- Resilient IT Security--Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.
Preț: 290.45 lei
Preț vechi: 363.07 lei
-20% Nou
Puncte Express: 436
Preț estimativ în valută:
55.59€ • 57.74$ • 46.17£
55.59€ • 57.74$ • 46.17£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Livrare express 27 decembrie 24 - 02 ianuarie 25 pentru 64.97 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781501515248
ISBN-10: 1501515241
Pagini: 444
Ilustrații: 79 b/w ill., 1 b/w tbl.
Dimensiuni: 155 x 229 x 24 mm
Greutate: 0.62 kg
Editura: De Gruyter
ISBN-10: 1501515241
Pagini: 444
Ilustrații: 79 b/w ill., 1 b/w tbl.
Dimensiuni: 155 x 229 x 24 mm
Greutate: 0.62 kg
Editura: De Gruyter
Notă biografică
Chris K. Williams, Leidos, USA; Scott E. Donaldson, Johns Hopkins University, USA; Stanley G. Siegel, Johns Hopkins University, USA
Cuprins
FOREWORD - 1 page
ABOUT THE AUTHORS - 1 page
ACKNOWLEDGMENTS - 1 page
INTRODUCTION - 2 pages
ABOUT THE AUTHORS - 1 page
ACKNOWLEDGMENTS - 1 page
INTRODUCTION - 2 pages
- What is this book about?
- Who should read this book?
- Why did the authors write this book?
- Organization of the book
- Chapter 1-Business Case (~15 pages)
- Chapter 2-IT Security Mind Set (~15 pages)
- Chapter 3-IT Security Risk Management (~15 pages)
- Chapter 4-IT Security Process (~15 pages)
- Chapter 5-IT Security Scenarios and Perspectives (~40 pages)
- IT security at home
- IT security while traveling
- IT security at work
- IT security as an executive
- International IT security
- Chapter 6-Planning IT Security Awareness and Training (~15 pages)
- Chapter 7-Implementing IT Security Awareness and Training Program(~15 pages)
- Chapter 8-Measuring IT Security Awareness and Training Program Implementation (~15 pages)
- Chapter 9-Managing Continual Program Improvement (~15 pages)
- Chapter 10-Looking to the Future (~15 pages)
APPENDICES - 10 pages
GLOSSARY - 3 pages
BIBLIOGRAPHY - 3 pages
INDEX - 4 pages