The cyber security handbook prepare for, respond to and recover from cyber attacks / Alan Calder.
"This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for s...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Ely :
ITGP,
2020.
|
Subjects: |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | b12301949 | ||
005 | 20231215081412.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 201127s2020 enk fo 000 0 eng d | ||
020 | |a 9781787782617 |q (e-book) | ||
020 | |a 1787782611 |q (e-book) | ||
020 | |a 9781787782631 |q (electronic bk.) | ||
020 | |a 1787782638 |q (electronic bk.) | ||
020 | |a 9781787782624 (ePub ebook) | ||
020 | |a 178778262X (ePub ebook) | ||
020 | |z 9781787782600 (pbk.) | ||
035 | |a (OCoLC)sks1228890103 | ||
035 | |a (OCoLC)1228890103 | ||
037 | |a sks154311 | ||
040 | |a UKAHL |b eng |e rda |c UKAHL |d OCLCO |d N$T |d OCLCO |d YDX |d OCLCF |d UKAHL |d OCLCO |d YT1 |d OCL |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 |b C35 2020 | |
100 | 1 | |a Calder, Alan, |d 1957- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb | |
245 | 1 | 4 | |a The cyber security handbook |b prepare for, respond to and recover from cyber attacks / |c Alan Calder. |
264 | 1 | |a Ely : |b ITGP, |c 2020. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | 8 | |a "This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success."--from the publisher. | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a Handbooks and manuals |2 fast | |
856 | 4 | 0 | |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=154311 |z Full Text (via Skillsoft) |
915 | |a M | ||
956 | |a Skillsoft ITPro | ||
956 | |b Skillsoft ITPro Skillport Collection | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i f54b903a-2e8a-526f-8743-925b215803e6 |s 8cf8b80f-4916-5d7a-854b-957e9b58bfbf |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 C35 2020 |h Library of Congress classification |i web |n 1 |