Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Wittkop, Jeremy (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2016.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Chapter 1: The Problem We Are Facing
  • Chapter 2 : Protecting Critical Assets
  • Chapter 3: Monetizing Risk
  • Chapter 4: Security Intelligence Model
  • Chapter 5: Incident Response Planning
  • Chapter 6: The People Problem
  • Chapter 7: Assigning Accountability
  • Chapter 8: Shifting the Paradigm
  • Chapter 9: The Definition of Insanity
  • Chapter 10: Déjà Vu
  • Chapter 11: The Information Security Community
  • Chapter 12: Partnering with Governments
  • .