000 | 01715nam a22004097a 4500 | ||
---|---|---|---|
999 |
_c13813 _d13812 |
||
003 | OSt | ||
005 | 20231110085504.0 | ||
006 | m|||||o||d| 00| 0 | ||
007 | cr || auc||a|a | ||
008 | 210324s2020 nyua||||s|||| 001 0 eng d | ||
020 |
_a9781484259528 _qelectronic |
||
040 | _cQCPL | ||
100 | 1 |
_91212 _aBlum, Dan _eauthor |
|
245 | 1 | 0 |
_aRational cybersecurity for business _b: the security leaders’ guide to business alignment _c/ Dan Blum |
264 | 1 |
_aNew York : _bApress Open, _c[2020] |
|
300 |
_a1 online resource (333 pages) : _billustrations |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _acomputer |
||
338 |
_2rdacarrier _aonline resource |
||
500 | _aIncludes index. | ||
505 | 0 | _aChapter 1. Executive overview | |
505 | 0 | _aChapter 2. Identify and align security-related roles | |
505 | 0 | _aChapter 3. Put the right security governance model in place | |
505 | 0 | _aChapter 4. Strengthen security culture through effective communications and awareness programs | |
505 | 0 | _aChapter 5. Manage risk in the language of business | |
505 | 0 | _aChapter 6. Establish a control baseline | |
505 | 0 | _aChapter 7. Simplify and rationalize it and security | |
505 | 0 | _aChapter 8. Control access with minimal drag on the business | |
505 | 0 | _aChapter 9. Institute resilience through detection, response, and recovery | |
505 | 0 | _aChapter 10. Create your rational cybersecurity success plan | |
650 | _aComputer security | ||
650 |
_aComputer networks _xSecurity measures |
||
655 | _aElectronic Books | ||
856 |
_alink.springer.com _uhttps://link.springer.com/content/pdf/10.1007%2F978-1-4842-5952-8.pdf |
||
942 |
_2ddc _cEBOOK |
||
690 | _aComputers & technology |