Building an effective security program:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
De Gruyter
[2020]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XIX, 425 Seiten Illustrationen 23 cm |
ISBN: | 9781501515248 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046999953 | ||
003 | DE-604 | ||
005 | 20201127 | ||
007 | t | ||
008 | 201116s2020 gw a||| |||| 00||| eng d | ||
015 | |a 20,A46 |2 dnb | ||
016 | 7 | |a 1219082171 |2 DE-101 | |
020 | |a 9781501515248 |c Broschur |9 978-1-5015-1524-8 | ||
035 | |a (OCoLC)1224486997 | ||
035 | |a (DE-599)DNB1219082171 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-12 | ||
082 | 0 | |a 658.472 |2 23/ger | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |8 1\p |a 650 |2 sdnb | ||
100 | 1 | |a Williams, Chris K. |e Verfasser |0 (DE-588)1164393871 |4 aut | |
245 | 1 | 0 | |a Building an effective security program |c Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel |
264 | 1 | |a Berlin |b De Gruyter |c [2020] | |
300 | |a XIX, 425 Seiten |b Illustrationen |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Informationssicherheit |0 (DE-588)1217680330 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Security; Cybercrime; Cybersecurity; Phishing; Hacking; Cyber Threat; Virus | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationssicherheit |0 (DE-588)1217680330 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Donaldson, Scott E. |e Verfasser |0 (DE-588)1164388738 |4 aut | |
700 | 1 | |a Siegel, Stanley G. |e Verfasser |0 (DE-588)1164393596 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Building an Effective Security Program |b 1. Auflage |d Boston : De Gruyter, 2020 |h Online-Ressource, 444 Seiten, 79 Illustrationen |
856 | 4 | 2 | |m B:DE-101 |q application/pdf |u https://d-nb.info/1219082171/04 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032407609&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032407609 | ||
883 | 2 | |8 1\p |a dnb |d 20201103 |q DE-101 |u https://d-nb.info/provenance/plan#dnb |
Datensatz im Suchindex
_version_ | 1804181947985952768 |
---|---|
adam_text | CONTENTS
ACKNOWLEDGMENTS
*
VII
ABOUT
THE
AUTHORS
*
IX
INTRODUCTION
*
XV
CHAPTER
1
THE
DIGITAL
ORGANIZATION
*
1
EVERYONE
*
S
DIGITAL
LIFE
*
2
IT
AND
THE
MODERN
WORKPLACE
-----
3
WHAT
*
S
AT
STAKE?
*
6
THE
RISE
OF
CYBERCRIME
*
8
PROTECTING
THE
ORGANIZATION
*
9
THE
PEOPLE
FACTOR
*
11
REAL-WORLD
CYBER
FAILURES
*
11
WHAT
DOES
IT
ALL
MEAN?
-----
15
CHAPTER
2
EVER-PRESENT
CYBER
THREATS
*
16
WHO
ARE
THE
HACKERS?
*
16
THE
CYBERCRIME
*
ATTRIBUTION
PROBLEM
*
*
21
THE
CYBERCRIME
*
PROSECUTION
PROBLEM
*
*
24
WHAT
DO
THE
HACKERS
WANT?
*
25
HOW
DO
HACKERS
ACCOMPLISH
THEIR
GOALS?
*
27
WHAT
DO
REAL-WORLD
CYBERATTACKS
LOOK
LIKE?
-----
31
HOW
DO
CYBERDEFENSES
COUNTER
ATTACKS?
*
35
CHOOSING
AND
PRIORITIZING
CYBERDEFENSES
*
40
CHAPTER
3
CYBER
RISK
MANAGEMENT
*
41
CYBER
RISK
MANAGEMENT
PROCESS
*
41
RISK
REGISTERS
*
53
WRAPPING
UP:
THE
CYBER
RISK
MANAGEMENT
PROCESS
-----
54
CHAPTER
4
CYBERDEFENSE
CONCEPTS
*
55
CYBERDEFENSE
SECURITY
CONTROLS
AND
CONTROL
TARGETS
*
56
PREVENTIVE
CONTROLS
*
59
XII
CONTENTS
DETECTIVE
CONTROLS
*
63
RESPONSE
CONTROLS
*
66
RECOVERY
CONTROLS
*
70
CYBERSECURITY
AUDITS
AND
ASSESSMENTS
*
74
CYBERSECURITY
TECHNOLOGIES
AND
CAPABILITIES
*
77
CYBERSECURITY
OPERATIONAL
PROCESSES
*
78
CHAPTER
5
CYBERSECURITY
DRIVERS
*
80
LAWS
AND
REGULATIONS
*
81
CYBERDEFENSE
STANDARDS
*
83
CONTRACTUAL
OBLIGATIONS
*
87
LIABILITY
AND
INSURANCE
*
90
DOING
THE
RIGHT
THING
-----92
CHAPTER
6
CYBER
PROGRAM
MANAGEMENT
*
95
DETERMINING
CYBERSECURITY
PROGRAM
REPORTING
STRUCTURE
*
96
CYBERSECURITY
TEAM
SUB-FUNCTIONS
*
98
BALANCING
CYBERSECURITY
PROTECTION
WITH
OTHER
BUSINESS
PRIORITIES
-----
101
MANAGING
CYBERSECURITY
COSTS
*
104
ESTABLISHING
CYBER
POLICY
ELEMENTS
-----
107
CONDUCTING
OUTREACH
AND
TRAINING
*
110
REPORTING
CYBERSECURITY
PROGRAM
STATUS
AND
PERFORMANCE
*
113
CHAPTER
7
CYBERSECURITY
CAPABILITIES
*
118
CYBERSECURITY
CAPABILITIES
*
118
ORGANIZATION
CYBERSECURITY
FRAMEWORKS
*
119
ORGANIZATION
CYBERSECURITY
FRAMEWORK
COMPONENTS
*
121
CYBERSECURITY
FRAMEWORK
ARCHITECTURE
*
123
CHAPTER
8
CYBERSECURITY
OPERATIONS
*
162
MAINTAINING
CYBER
PROTECTIONS
*
163
PERFORMING
IDENTITY
AND
ACCESS
MANAGEMENT
*
166
MITIGATING
VULNERABILITIES
-----
169
MAINTAINING
DETECTION
SENSORS
*
172
DETECTING
AND
RESPONDING
TO
CYBER
INCIDENTS
*
175
CONTENTS
XIII
RECOVERING
FROM
CYBER
INCIDENTS
*
179
HUNTING
FOR
CYBER
TROUBLE
-----
184
CONDUCTING
CYBER
ASSESSMENTS
AND
AUDITS
*
188
CHAPTER
9
CYBER
AWARENESS
*
193
CYBER
MINDSET
-----
193
THINGS
OF
VALUE:
AT
WORK
-----
196
THINGS
OF
VALUE:
AT
HOME
-----
199
PROTECTING
YOURSELF
ON
TRAVEL
-----
202
CHAPTER
10
ORGANIZATION
CYBER
AWARENESS
*
210
ORGANIZATIONAL
CYBERATTACK
SEQUENCE
*
211
NETWORK
PERIMETER
AND
SECURITY
CYBER
AWARENESS
*
213
ENDPOINT
HARDENING
AND
ENCRYPTION
CYBER
AWARENESS
*
216
IDENTITY
MANAGEMENT,
AUTHENTICATION,
AND
ACCESS
MANAGEMENT
CYBER
AWARENESS
-----
219
WEB
AND
E-MAIL
PROTECTION
CYBER
AWARENESS
-----
222
REMOTE
ACCESS
TO
ORGANIZATION
IT
RESOURCES
CYBER
AWARENESS
*
225
CYBERSECURITY
OPERATIONS
CYBER
AWARENESS
*
227
INCIDENT
RESPONSE
CYBER
AWARENESS
*
231
PHYSICAL
SECURITY
AND
PERSONNEL
PROTECTION
CYBER
AWARENESS
*
234
BUSINESS
CONTINUITY
AND
DISASTER
RECOVERY
CYBER
AWARENESS
*
237
CHAPTER
11
CYBER
TRAINING
*
242
CYBER
TRAINING
FOR
EVERYONE
-----
245
CYBER
TRAINING
FOR
EXECUTIVES
-----
247
CYBER
TRAINING
FOR
IT
STAFF
-----
250
CYBER
TRAINING
FOR
SECURITY
STAFF
*
253
CYBER
TRAINING
FOR
PARTNERS
*
254
CYBER
TRAINING
FOR
SPECIALISTS
*
255
CHAPTER
12
MEASURING
CYBER
PERFORMANCE
*
257
SECURITY
METRICS
-----258
DASHBOARDS
AND
REPORTING
-----
265
AUDITS
AND
ASSESSMENTS
*
268
DEFICIENCIES,
VULNERABILITIES,
AND
RISK
-----
272
XIV
*
CONTENTS
CONTINUAL
CYBER
IMPROVEMENT
-----
275
KNOWING
WHEN
TO
STOP
-----
279
CHAPTER
13
WHEN
THINGS
GO
WRONG
-----
286
BEING
PREPARED
-----
288
DETECTING
AND
RESPONDING
TO
INCIDENTS
-----
292
REPORTING
TO
MANAGEMENT
AND
EMPLOYEES
*
296
CONTAINING
A
CYBER
OUTBREAK
-----
300
CHANGING
PASSWORDS
*
304
MANAGING
A
CYBER
CRISIS
-----
311
CLEANING
UP
THE
MESS
-----
317
COMMUNICATING
WITH
REGULATORS,
PARTNERS,
AND
THE
PUBLIC
-----
322
CYBER
INSURANCE
*
328
RESILIENCE
-----
333
CHAPTER
14
LOOKING
TO
THE
FUTURE
-----
340
EVOLVING
IT
TRENDS
----
341
EVOLVING
CYBER
THREATS
-----
344
STAY
CALM,
AWARE,
AND
PREPARED
*
348
BE
CAUTIOUS,
BUT
SMART
-----
352
APPENDIX
A:
COMMON
MALWARE
THREATS
*
355
APPENDIX
B:
CYBER
AWARENESS
AND
CYBER
TRAINING
TOPICS
*
365
APPENDIX
C:
EXAMPLE
CYBER
POLICY
-----
371
APPENDIX
D:
ONLINE
CYBERSECURITY
RESOURCES
*
393
GLOSSARY-----407
INDEX
*
419
|
adam_txt |
CONTENTS
ACKNOWLEDGMENTS
*
VII
ABOUT
THE
AUTHORS
*
IX
INTRODUCTION
*
XV
CHAPTER
1
THE
DIGITAL
ORGANIZATION
*
1
EVERYONE
*
S
DIGITAL
LIFE
*
2
IT
AND
THE
MODERN
WORKPLACE
-----
3
WHAT
*
S
AT
STAKE?
*
6
THE
RISE
OF
CYBERCRIME
*
8
PROTECTING
THE
ORGANIZATION
*
9
THE
PEOPLE
FACTOR
*
11
REAL-WORLD
CYBER
FAILURES
*
11
WHAT
DOES
IT
ALL
MEAN?
-----
15
CHAPTER
2
EVER-PRESENT
CYBER
THREATS
*
16
WHO
ARE
THE
HACKERS?
*
16
THE
CYBERCRIME
*
ATTRIBUTION
PROBLEM
*
*
21
THE
CYBERCRIME
*
PROSECUTION
PROBLEM
*
*
24
WHAT
DO
THE
HACKERS
WANT?
*
25
HOW
DO
HACKERS
ACCOMPLISH
THEIR
GOALS?
*
27
WHAT
DO
REAL-WORLD
CYBERATTACKS
LOOK
LIKE?
-----
31
HOW
DO
CYBERDEFENSES
COUNTER
ATTACKS?
*
35
CHOOSING
AND
PRIORITIZING
CYBERDEFENSES
*
40
CHAPTER
3
CYBER
RISK
MANAGEMENT
*
41
CYBER
RISK
MANAGEMENT
PROCESS
*
41
RISK
REGISTERS
*
53
WRAPPING
UP:
THE
CYBER
RISK
MANAGEMENT
PROCESS
-----
54
CHAPTER
4
CYBERDEFENSE
CONCEPTS
*
55
CYBERDEFENSE
SECURITY
CONTROLS
AND
CONTROL
TARGETS
*
56
PREVENTIVE
CONTROLS
*
59
XII
CONTENTS
DETECTIVE
CONTROLS
*
63
RESPONSE
CONTROLS
*
66
RECOVERY
CONTROLS
*
70
CYBERSECURITY
AUDITS
AND
ASSESSMENTS
*
74
CYBERSECURITY
TECHNOLOGIES
AND
CAPABILITIES
*
77
CYBERSECURITY
OPERATIONAL
PROCESSES
*
78
CHAPTER
5
CYBERSECURITY
DRIVERS
*
80
LAWS
AND
REGULATIONS
*
81
CYBERDEFENSE
STANDARDS
*
83
CONTRACTUAL
OBLIGATIONS
*
87
LIABILITY
AND
INSURANCE
*
90
DOING
THE
RIGHT
THING
-----92
CHAPTER
6
CYBER
PROGRAM
MANAGEMENT
*
95
DETERMINING
CYBERSECURITY
PROGRAM
REPORTING
STRUCTURE
*
96
CYBERSECURITY
TEAM
SUB-FUNCTIONS
*
98
BALANCING
CYBERSECURITY
PROTECTION
WITH
OTHER
BUSINESS
PRIORITIES
-----
101
MANAGING
CYBERSECURITY
COSTS
*
104
ESTABLISHING
CYBER
POLICY
ELEMENTS
-----
107
CONDUCTING
OUTREACH
AND
TRAINING
*
110
REPORTING
CYBERSECURITY
PROGRAM
STATUS
AND
PERFORMANCE
*
113
CHAPTER
7
CYBERSECURITY
CAPABILITIES
*
118
CYBERSECURITY
CAPABILITIES
*
118
ORGANIZATION
CYBERSECURITY
FRAMEWORKS
*
119
ORGANIZATION
CYBERSECURITY
FRAMEWORK
COMPONENTS
*
121
CYBERSECURITY
FRAMEWORK
ARCHITECTURE
*
123
CHAPTER
8
CYBERSECURITY
OPERATIONS
*
162
MAINTAINING
CYBER
PROTECTIONS
*
163
PERFORMING
IDENTITY
AND
ACCESS
MANAGEMENT
*
166
MITIGATING
VULNERABILITIES
-----
169
MAINTAINING
DETECTION
SENSORS
*
172
DETECTING
AND
RESPONDING
TO
CYBER
INCIDENTS
*
175
CONTENTS
XIII
RECOVERING
FROM
CYBER
INCIDENTS
*
179
HUNTING
FOR
CYBER
TROUBLE
-----
184
CONDUCTING
CYBER
ASSESSMENTS
AND
AUDITS
*
188
CHAPTER
9
CYBER
AWARENESS
*
193
CYBER
MINDSET
-----
193
THINGS
OF
VALUE:
AT
WORK
-----
196
THINGS
OF
VALUE:
AT
HOME
-----
199
PROTECTING
YOURSELF
ON
TRAVEL
-----
202
CHAPTER
10
ORGANIZATION
CYBER
AWARENESS
*
210
ORGANIZATIONAL
CYBERATTACK
SEQUENCE
*
211
NETWORK
PERIMETER
AND
SECURITY
CYBER
AWARENESS
*
213
ENDPOINT
HARDENING
AND
ENCRYPTION
CYBER
AWARENESS
*
216
IDENTITY
MANAGEMENT,
AUTHENTICATION,
AND
ACCESS
MANAGEMENT
CYBER
AWARENESS
-----
219
WEB
AND
E-MAIL
PROTECTION
CYBER
AWARENESS
-----
222
REMOTE
ACCESS
TO
ORGANIZATION
IT
RESOURCES
CYBER
AWARENESS
*
225
CYBERSECURITY
OPERATIONS
CYBER
AWARENESS
*
227
INCIDENT
RESPONSE
CYBER
AWARENESS
*
231
PHYSICAL
SECURITY
AND
PERSONNEL
PROTECTION
CYBER
AWARENESS
*
234
BUSINESS
CONTINUITY
AND
DISASTER
RECOVERY
CYBER
AWARENESS
*
237
CHAPTER
11
CYBER
TRAINING
*
242
CYBER
TRAINING
FOR
EVERYONE
-----
245
CYBER
TRAINING
FOR
EXECUTIVES
-----
247
CYBER
TRAINING
FOR
IT
STAFF
-----
250
CYBER
TRAINING
FOR
SECURITY
STAFF
*
253
CYBER
TRAINING
FOR
PARTNERS
*
254
CYBER
TRAINING
FOR
SPECIALISTS
*
255
CHAPTER
12
MEASURING
CYBER
PERFORMANCE
*
257
SECURITY
METRICS
-----258
DASHBOARDS
AND
REPORTING
-----
265
AUDITS
AND
ASSESSMENTS
*
268
DEFICIENCIES,
VULNERABILITIES,
AND
RISK
-----
272
XIV
*
CONTENTS
CONTINUAL
CYBER
IMPROVEMENT
-----
275
KNOWING
WHEN
TO
STOP
-----
279
CHAPTER
13
WHEN
THINGS
GO
WRONG
-----
286
BEING
PREPARED
-----
288
DETECTING
AND
RESPONDING
TO
INCIDENTS
-----
292
REPORTING
TO
MANAGEMENT
AND
EMPLOYEES
*
296
CONTAINING
A
CYBER
OUTBREAK
-----
300
CHANGING
PASSWORDS
*
304
MANAGING
A
CYBER
CRISIS
-----
311
CLEANING
UP
THE
MESS
-----
317
COMMUNICATING
WITH
REGULATORS,
PARTNERS,
AND
THE
PUBLIC
-----
322
CYBER
INSURANCE
*
328
RESILIENCE
-----
333
CHAPTER
14
LOOKING
TO
THE
FUTURE
-----
340
EVOLVING
IT
TRENDS
----
341
EVOLVING
CYBER
THREATS
-----
344
STAY
CALM,
AWARE,
AND
PREPARED
*
348
BE
CAUTIOUS,
BUT
SMART
-----
352
APPENDIX
A:
COMMON
MALWARE
THREATS
*
355
APPENDIX
B:
CYBER
AWARENESS
AND
CYBER
TRAINING
TOPICS
*
365
APPENDIX
C:
EXAMPLE
CYBER
POLICY
-----
371
APPENDIX
D:
ONLINE
CYBERSECURITY
RESOURCES
*
393
GLOSSARY-----407
INDEX
*
419 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. |
author_GND | (DE-588)1164393871 (DE-588)1164388738 (DE-588)1164393596 |
author_facet | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. |
author_role | aut aut aut |
author_sort | Williams, Chris K. |
author_variant | c k w ck ckw s e d se sed s g s sg sgs |
building | Verbundindex |
bvnumber | BV046999953 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1224486997 (DE-599)DNB1219082171 |
dewey-full | 658.472 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.472 |
dewey-search | 658.472 |
dewey-sort | 3658.472 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02119nam a2200469 c 4500</leader><controlfield tag="001">BV046999953</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201127 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">201116s2020 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">20,A46</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1219082171</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501515248</subfield><subfield code="c">Broschur</subfield><subfield code="9">978-1-5015-1524-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224486997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1219082171</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.472</subfield><subfield code="2">23/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building an effective security program</subfield><subfield code="c">Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">De Gruyter</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 425 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security; Cybercrime; Cybersecurity; Phishing; Hacking; Cyber Threat; Virus</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssicherheit</subfield><subfield code="0">(DE-588)1217680330</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164388738</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393596</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Building an Effective Security Program</subfield><subfield code="b">1. Auflage</subfield><subfield code="d">Boston : De Gruyter, 2020</subfield><subfield code="h">Online-Ressource, 444 Seiten, 79 Illustrationen</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-101</subfield><subfield code="q">application/pdf</subfield><subfield code="u">https://d-nb.info/1219082171/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032407609&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032407609</subfield></datafield><datafield tag="883" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">dnb</subfield><subfield code="d">20201103</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#dnb</subfield></datafield></record></collection> |
id | DE-604.BV046999953 |
illustrated | Illustrated |
index_date | 2024-07-03T15:56:32Z |
indexdate | 2024-07-10T08:59:45Z |
institution | BVB |
isbn | 9781501515248 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032407609 |
oclc_num | 1224486997 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XIX, 425 Seiten Illustrationen 23 cm |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | De Gruyter |
record_format | marc |
spelling | Williams, Chris K. Verfasser (DE-588)1164393871 aut Building an effective security program Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel Berlin De Gruyter [2020] XIX, 425 Seiten Illustrationen 23 cm txt rdacontent n rdamedia nc rdacarrier Informationssicherheit (DE-588)1217680330 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Security; Cybercrime; Cybersecurity; Phishing; Hacking; Cyber Threat; Virus Computersicherheit (DE-588)4274324-2 s Informationssicherheit (DE-588)1217680330 s DE-604 Donaldson, Scott E. Verfasser (DE-588)1164388738 aut Siegel, Stanley G. Verfasser (DE-588)1164393596 aut Erscheint auch als Online-Ausgabe Building an Effective Security Program 1. Auflage Boston : De Gruyter, 2020 Online-Ressource, 444 Seiten, 79 Illustrationen B:DE-101 application/pdf https://d-nb.info/1219082171/04 Inhaltsverzeichnis DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032407609&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p dnb 20201103 DE-101 https://d-nb.info/provenance/plan#dnb |
spellingShingle | Williams, Chris K. Donaldson, Scott E. Siegel, Stanley G. Building an effective security program Informationssicherheit (DE-588)1217680330 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1217680330 (DE-588)4274324-2 |
title | Building an effective security program |
title_auth | Building an effective security program |
title_exact_search | Building an effective security program |
title_exact_search_txtP | Building an effective security program |
title_full | Building an effective security program Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel |
title_fullStr | Building an effective security program Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel |
title_full_unstemmed | Building an effective security program Chris K. Williams, Scott E. Donaldson, and Stanley G. Siegel |
title_short | Building an effective security program |
title_sort | building an effective security program |
topic | Informationssicherheit (DE-588)1217680330 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Informationssicherheit Computersicherheit |
url | https://d-nb.info/1219082171/04 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032407609&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT williamschrisk buildinganeffectivesecurityprogram AT donaldsonscotte buildinganeffectivesecurityprogram AT siegelstanleyg buildinganeffectivesecurityprogram |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis