Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2015
|
Schlagworte: | |
Online-Zugang: | FHM01 FHN01 FHR01 FNU01 FWS01 FWS02 URL des Erstveröffentlichers Abstract |
Beschreibung: | 1 Online-Ressource (XLII, 490 Seiten) Illustrationen |
ISBN: | 9781430260837 |
DOI: | 10.1007/978-1-4302-6083-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042592015 | ||
003 | DE-604 | ||
005 | 20160721 | ||
007 | cr|uuu---uuuuu | ||
008 | 150602s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781430260837 |c Online |9 978-1-4302-6083-7 | ||
024 | 7 | |a 10.1007/978-1-4302-6083-7 |2 doi | |
035 | |a (OCoLC)910753627 | ||
035 | |a (DE-599)BVBBV042592015 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-M347 |a DE-1049 |a DE-863 |a DE-92 |a DE-862 | ||
082 | 0 | |a 650 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Donaldson, Scott E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Enterprise Cybersecurity |b How to Build a Successful Cyberdefense Program Against Advanced Threats |c by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
264 | 1 | |a Berkeley, CA |b Apress |c 2015 | |
300 | |a 1 Online-Ressource (XLII, 490 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Siegel, Stanley G. |e Verfasser |4 aut | |
700 | 1 | |a Williams, Chris K. |e Verfasser |4 aut | |
700 | 1 | |a Aslam, Abdul |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4302-6082-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4302-6083-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028025227 | ||
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FNU01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4302-6083-7 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 563743 |
---|---|
_version_ | 1806179286360522752 |
adam_text | ENTERPRISE CYBERSECURITY
/ DONALDSON, SCOTT E.
: 2015
ABSTRACT / INHALTSTEXT
ENTERPRISE CYBERSECURITY EMPOWERS ORGANIZATIONS OF ALL SIZES TO DEFEND
THEMSELVES WITH NEXT-GENERATION CYBERSECURITY PROGRAMS AGAINST THE
ESCALATING THREAT OF MODERN TARGETED CYBERATTACKS. THIS BOOK PRESENTS A
COMPREHENSIVE FRAMEWORK FOR MANAGING ALL ASPECTS OF AN ENTERPRISE
CYBERSECURITY PROGRAM. IT ENABLES AN ENTERPRISE TO ARCHITECT, DESIGN,
IMPLEMENT, AND OPERATE A COHERENT CYBERSECURITY PROGRAM THAT IS
SEAMLESSLY COORDINATED WITH POLICY, PROGRAMMATICS, IT LIFE CYCLE, AND
ASSESSMENT. FAIL-SAFE CYBERDEFENSE IS A PIPE DREAM. GIVEN SUFFICIENT
TIME, AN INTELLIGENT ATTACKER CAN EVENTUALLY DEFEAT DEFENSIVE MEASURES
PROTECTING AN ENTERPRISE’S COMPUTER SYSTEMS AND IT NETWORKS. TO
PREVAIL, AN ENTERPRISE CYBERSECURITY PROGRAM MUST MANAGE RISK BY
DETECTING ATTACKS EARLY ENOUGH AND DELAYING THEM LONG ENOUGH THAT THE
DEFENDERS HAVE TIME TO RESPOND EFFECTIVELY. ENTERPRISE CYBERSECURITY
SHOWS PLAYERS AT ALL LEVELS OF RESPONSIBILITY HOW TO UNIFY THEIR
ORGANIZATION’S PEOPLE, BUDGETS, TECHNOLOGIES, AND PROCESSES INTO A
COST-EFFICIENT CYBERSECURITY PROGRAM CAPABLE OF COUNTERING ADVANCED
CYBERATTACKS AND CONTAINING DAMAGE IN THE EVENT OF A BREACH. THE AUTHORS
OF ENTERPRISE CYBERSECURITY EXPLAIN AT BOTH STRATEGIC AND TACTICAL
LEVELS HOW TO ACCOMPLISH THE MISSION OF LEADING, DESIGNING, DEPLOYING,
OPERATING, MANAGING, AND SUPPORTING CYBERSECURITY CAPABILITIES IN AN
ENTERPRISE ENVIRONMENT. THE AUTHORS ARE RECOGNIZED EXPERTS AND THOUGHT
LEADERS IN THIS RAPIDLY EVOLVING FIELD, DRAWING ON DECADES OF COLLECTIVE
EXPERIENCE IN CYBERSECURITY AND IT. IN CAPACITIES RANGING FROM EXECUTIVE
STRATEGIST TO SYSTEMS ARCHITECT TO CYBERCOMBATANT, SCOTT E. DONALDSON,
STANLEY G. SIEGEL, CHRIS K. WILLIAMS, AND ABDUL ASLAM HAVE FOUGHT ON THE
FRONT LINES OF CYBERSECURITY AGAINST ADVANCED PERSISTENT THREATS TO
GOVERNMENT, MILITARY, AND BUSINESS ENTITIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_facet | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_role | aut aut aut aut |
author_sort | Donaldson, Scott E. |
author_variant | s e d se sed s g s sg sgs c k w ck ckw a a aa |
building | Verbundindex |
bvnumber | BV042592015 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-CWD |
ctrlnum | (OCoLC)910753627 (DE-599)BVBBV042592015 |
dewey-full | 650 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 650 - Management and auxiliary services |
dewey-raw | 650 |
dewey-search | 650 |
dewey-sort | 3650 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-1-4302-6083-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02640nmm a2200553zc 4500</leader><controlfield tag="001">BV042592015</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160721 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150602s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430260837</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4302-6083-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4302-6083-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910753627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042592015</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">650</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise Cybersecurity</subfield><subfield code="b">How to Build a Successful Cyberdefense Program Against Advanced Threats</subfield><subfield code="c">by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XLII, 490 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4302-6082-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028025227</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FNU01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4302-6083-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042592015 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:06:35Z |
institution | BVB |
isbn | 9781430260837 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028025227 |
oclc_num | 910753627 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-M347 DE-1049 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS |
owner_facet | DE-898 DE-BY-UBR DE-M347 DE-1049 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XLII, 490 Seiten) Illustrationen |
psigel | ZDB-2-CWD ZDB-2-CWD_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Apress |
record_format | marc |
spellingShingle | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4026894-9 (DE-588)4274324-2 |
title | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats |
title_auth | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats |
title_exact_search | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats |
title_full | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_fullStr | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_full_unstemmed | Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_short | Enterprise Cybersecurity |
title_sort | enterprise cybersecurity how to build a successful cyberdefense program against advanced threats |
title_sub | How to Build a Successful Cyberdefense Program Against Advanced Threats |
topic | Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Chiffrierung Informatik Computersicherheit |
url | https://doi.org/10.1007/978-1-4302-6083-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025227&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT donaldsonscotte enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT siegelstanleyg enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT williamschrisk enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT aslamabdul enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats |