The cyber security handbook prepare for, respond to and recover from cyber attacks / Alan Calder.

"This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for s...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Skillsoft)
Main Author: Calder, Alan, 1957- (Author)
Format: Electronic eBook
Language:English
Published: Ely : ITGP, 2020.
Subjects:

MARC

LEADER 00000cam a2200000Mi 4500
001 b12301949
005 20231215081412.0
006 m o d
007 cr |||||||||||
008 201127s2020 enk fo 000 0 eng d
020 |a 9781787782617  |q (e-book) 
020 |a 1787782611  |q (e-book) 
020 |a 9781787782631  |q (electronic bk.) 
020 |a 1787782638  |q (electronic bk.) 
020 |a 9781787782624 (ePub ebook) 
020 |a 178778262X (ePub ebook) 
020 |z 9781787782600 (pbk.) 
035 |a (OCoLC)sks1228890103 
035 |a (OCoLC)1228890103 
037 |a sks154311 
040 |a UKAHL  |b eng  |e rda  |c UKAHL  |d OCLCO  |d N$T  |d OCLCO  |d YDX  |d OCLCF  |d UKAHL  |d OCLCO  |d YT1  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a GWRE 
050 4 |a QA76.9.A25  |b C35 2020 
100 1 |a Calder, Alan,  |d 1957-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb 
245 1 4 |a The cyber security handbook  |b prepare for, respond to and recover from cyber attacks /  |c Alan Calder. 
264 1 |a Ely :  |b ITGP,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 8 |a "This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success."--from the publisher. 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
856 4 0 |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=154311  |z Full Text (via Skillsoft) 
915 |a M 
956 |a Skillsoft ITPro 
956 |b Skillsoft ITPro Skillport Collection 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i f54b903a-2e8a-526f-8743-925b215803e6  |s 8cf8b80f-4916-5d7a-854b-957e9b58bfbf 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 C35 2020  |h Library of Congress classification  |i web  |n 1