How to Build a Cyber-Resilient Organization
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systemati...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Language: | English |
Published: |
New York
CRC Press
2019
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000 i 4501 | ||
---|---|---|---|
001 | wils-941449 | ||
005 | 2019451216 | ||
008 | 2019 NYU ag| |#001 ##eng#D | ||
020 | # | # | |a 9781138558199 |q paperback |
040 | # | # | |e rda |8 UiTM |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9.A25 |b S4933 2019 |
100 | 1 | # | |a Shoemaker, Dan |e author |
245 | 0 | 0 | |a How to Build a Cyber-Resilient Organization |c Dan Shoemaker, Anne Kohnke, and Ken Sigler |
264 | # | 1 | |a New York |b CRC Press |c 2019 |
300 | # | # | |a xxi, 296 pages : |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Includes index |
520 | # | # | |a This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment. This revolves around the steps to perform strategic cyber-resilience planning, implementation and evolution. Readers will know how to perform the necessary activities to identify, prioritize and deploy targeted controls and maintain a persistent and reliable reporting system. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Information technology |x Security measures |
700 | 1 | # | |a Kohnke, Anne |e author |
700 | 1 | # | |a Sigler, Kenneth |e author |
040 | # | # | |a Shah Alam |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=941449 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2|| |