Enterprise Cybersecurity Study Guide : (Record no. 6998)

MARC details
000 -LEADER
fixed length control field 01892nam a2200241Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210916s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484246283
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number DON
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Donaldson, Scott E.
245 #0 - TITLE STATEMENT
Title Enterprise Cybersecurity Study Guide :
Remainder of title how to build a successful cyberdefense program against advanced threats
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent 709p.
520 ## - SUMMARY, ETC.
Summary, etc. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment.<br/><br/>Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks.<br/><br/>To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberdefense
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Siegel, Stanley G.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Williams, Chris K.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Aslam, Abdul
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 6619
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 447
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 6620
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4505
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 400
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 6621
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 6622
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 6623
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code bill no. bill date Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Computer science 280 31.03.2021 Plaksha University Library Plaksha University Library 16/09/2021 T V Enterprises 2099.00   005.8 DON 001692 09/07/2023 16/09/2021 Book

Customize & Implimented by Jivesna Tech.

Total Visits to Site Till Date:best free website hit counter

Powered by Koha