Critical Incident Management
Autor Alan B. Sterneckerten Limba Engleză Hardback – 29 sep 2003
Critical Incident Management presents an expert overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations. Written in a concise, practical style that emphasizes key points, this guide focuses on the establishment of policies and actions that prevent the loss of critical information or damage to infrastructure.
CTOs, CFOs, Chief Legal Officers, and senior IT managers can rely on this book to develop plans that thwart critical security incidents. And if such incidents do occur, these executives will have a reference to help put the people and procedures in place to contain the damage and get back to business.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 348.74 lei 6-8 săpt. | |
CRC Press – 19 iun 2019 | 348.74 lei 6-8 săpt. | |
Hardback (1) | 686.07 lei 6-8 săpt. | |
CRC Press – 29 sep 2003 | 686.07 lei 6-8 săpt. |
Preț: 686.07 lei
Preț vechi: 921.30 lei
-26% Nou
Puncte Express: 1029
Preț estimativ în valută:
131.32€ • 141.20$ • 109.48£
131.32€ • 141.20$ • 109.48£
Carte tipărită la comandă
Livrare economică 20 decembrie 24 - 03 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849300103
ISBN-10: 084930010X
Pagini: 550
Ilustrații: 23 b/w images, 94 tables and 15 halftones
Dimensiuni: 178 x 254 x 34 mm
Greutate: 1.11 kg
Ediția:New.
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 084930010X
Pagini: 550
Ilustrații: 23 b/w images, 94 tables and 15 halftones
Dimensiuni: 178 x 254 x 34 mm
Greutate: 1.11 kg
Ediția:New.
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Risk Management. Policies and Procedures. Auditing. Critical Incident Response and CIRT Development. Legal Matters. Privacy. Appendices.
Descriere
Critical Incident Management presents an overview of the elements that one needs to address to respond to network and information security violations. Written in a concise style that repeatedly emphasizes key points, it focuses on the establishment of policies and actions that prevent the loss of critical information or damage to infrastructure. CTOs, CFOs, Chief Legal Officers, or senior IT managers can rely on this book to develop plans that thwart critical security incidents. If such incidents do occur, they will have a reference to put the people and procedures in place to minimize damage and get back to business.