How to Build a Cyber-Resilient Organization

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systemati...

Full description

Saved in:
Bibliographic Details
Main Authors: Shoemaker, Dan (Author), Kohnke, Anne (Author), Sigler, Kenneth (Author)
Format: Book
Language:English
Published: New York CRC Press 2019
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4501
001 wils-941449
005 2019451216
008 2019 NYU ag| |#001 ##eng#D
020 # # |a 9781138558199  |q paperback 
040 # # |e rda  |8 UiTM 
041 0 # |a eng 
090 0 0 |a QA76.9.A25  |b S4933 2019 
100 1 # |a Shoemaker, Dan  |e author 
245 0 0 |a How to Build a Cyber-Resilient Organization  |c Dan Shoemaker, Anne Kohnke, and Ken Sigler 
264 # 1 |a New York  |b CRC Press  |c 2019 
300 # # |a xxi, 296 pages :  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
520 # # |a This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system. 
650 # 0 |a Computer security 
650 # 0 |a Computer networks  |x Security measures 
650 # 0 |a Information technology  |x Security measures 
700 1 # |a Kohnke, Anne  |e author 
700 1 # |a Sigler, Kenneth  |e author 
040 # # |a Shah Alam 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=941449 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||