Building an effective security program:
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security aw...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Boston
De Gruyter
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1043 DE-1046 DE-858 DE-573 DE-898 DE-859 DE-860 DE-863 DE-862 DE-739 Volltext |
Zusammenfassung: | Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Sep 2020) |
Beschreibung: | 1 Online Resource (XIX, 425 Seiten) |
ISBN: | 9781501506529 9781501506420 |
DOI: | 10.1515/9781501506529 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046948335 | ||
003 | DE-604 | ||
005 | 20210211 | ||
007 | cr|uuu---uuuuu | ||
008 | 201020s2020 xx o|||| 00||| eng d | ||
020 | |a 9781501506529 |c PDF |9 978-1-5015-0652-9 | ||
020 | |a 9781501506420 |c EPUB |9 978-1-5015-0642-0 | ||
024 | 7 | |a 10.1515/9781501506529 |2 doi | |
035 | |a (ZDB-23-DGG)9781501506529 | ||
035 | |a (OCoLC)1220882457 | ||
035 | |a (DE-599)BVBBV046948335 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-573 |a DE-898 |a DE-859 |a DE-860 |a DE-863 |a DE-862 |a DE-739 |a DE-1043 |a DE-858 |a DE-83 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Williams, Chris K. |e Verfasser |0 (DE-588)1164393871 |4 aut | |
245 | 1 | 0 | |a Building an effective security program |c Chris K. Williams, Scott E. Donaldson and Stanley G. Siegel |
264 | 1 | |a Berlin ; Boston |b De Gruyter |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a 1 Online Resource (XIX, 425 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Sep 2020) | ||
520 | |a Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future | ||
546 | |a In English | ||
650 | 4 | |a Cyber Threat | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Cybersecurity | |
650 | 4 | |a Hacking | |
650 | 4 | |a Phishing | |
650 | 4 | |a Security | |
650 | 4 | |a Virus | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 0 | 7 | |a Informationssicherheit |0 (DE-588)1217680330 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationssicherheit |0 (DE-588)1217680330 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Donaldson, Scott E. |0 (DE-588)1164388738 |4 aut | |
700 | 1 | |a Siegel, Stanley G. |0 (DE-588)1164393596 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5015-1524-8 |
856 | 4 | 0 | |u https://doi.org/10.1515/9781501506529 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
912 | |a ZDB-23-DEI | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032356890 | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-1043 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-1046 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-858 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-573 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-898 |p ZDB-23-DEI |q FHR_ZDB-23-DEI20 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-859 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-860 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/books/9781501506529 |l DE-863 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://www.degruyter.com/books/9781501506529 |l DE-862 |p ZDB-23-DEI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781501506529 |l DE-739 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 856874 |
---|---|
_version_ | 1824555105942241280 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. |
author_GND | (DE-588)1164393871 (DE-588)1164388738 (DE-588)1164393596 |
author_facet | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. |
author_role | aut aut aut |
author_sort | Williams, Chris K. |
author_variant | c k w ck ckw s e d se sed s g s sg sgs |
building | Verbundindex |
bvnumber | BV046948335 |
classification_rvk | ST 277 |
collection | ZDB-23-DGG ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9781501506529 (OCoLC)1220882457 (DE-599)BVBBV046948335 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1515/9781501506529 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV046948335</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210211</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201020s2020 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501506529</subfield><subfield code="c">PDF</subfield><subfield code="9">978-1-5015-0652-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501506420</subfield><subfield code="c">EPUB</subfield><subfield code="9">978-1-5015-0642-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501506529</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9781501506529</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220882457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046948335</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building an effective security program</subfield><subfield code="c">Chris K. Williams, Scott E. Donaldson and Stanley G. Siegel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Boston</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Resource (XIX, 425 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Sep 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber Threat</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybersecurity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virus</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="0">(DE-588)1164388738</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="0">(DE-588)1164393596</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5015-1524-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032356890</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">FHR_ZDB-23-DEI20</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/books/9781501506529</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.degruyter.com/books/9781501506529</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781501506529</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046948335 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:40:23Z |
indexdate | 2025-02-20T07:02:23Z |
institution | BVB |
isbn | 9781501506529 9781501506420 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032356890 |
oclc_num | 1220882457 |
open_access_boolean | |
owner | DE-1046 DE-573 DE-898 DE-BY-UBR DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 DE-1043 DE-858 DE-83 |
owner_facet | DE-1046 DE-573 DE-898 DE-BY-UBR DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 DE-1043 DE-858 DE-83 |
physical | 1 Online Resource (XIX, 425 Seiten) |
psigel | ZDB-23-DGG ZDB-23-DEI ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DEI FHR_ZDB-23-DEI20 ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | De Gruyter |
record_format | marc |
spellingShingle | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. Building an effective security program Cyber Threat Cybercrime Cybersecurity Hacking Phishing Security Virus COMPUTERS / Security / General bisacsh Informationssicherheit (DE-588)1217680330 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1217680330 (DE-588)4274324-2 |
title | Building an effective security program |
title_auth | Building an effective security program |
title_exact_search | Building an effective security program |
title_exact_search_txtP | Building an effective security program |
title_full | Building an effective security program Chris K. Williams, Scott E. Donaldson and Stanley G. Siegel |
title_fullStr | Building an effective security program Chris K. Williams, Scott E. Donaldson and Stanley G. Siegel |
title_full_unstemmed | Building an effective security program Chris K. Williams, Scott E. Donaldson and Stanley G. Siegel |
title_short | Building an effective security program |
title_sort | building an effective security program |
topic | Cyber Threat Cybercrime Cybersecurity Hacking Phishing Security Virus COMPUTERS / Security / General bisacsh Informationssicherheit (DE-588)1217680330 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyber Threat Cybercrime Cybersecurity Hacking Phishing Security Virus COMPUTERS / Security / General Informationssicherheit Computersicherheit |
url | https://doi.org/10.1515/9781501506529 |
work_keys_str_mv | AT williamschrisk buildinganeffectivesecurityprogram AT donaldsonscotte buildinganeffectivesecurityprogram AT siegelstanleyg buildinganeffectivesecurityprogram |