97 things every information security professional should know: collective wisdom from the experts
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Sebastopol, California
O'Reilly Media, Inc.
©2021
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll leaern how to expand your skills and solve common issues by working through everyday security problems. You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field - back cover |
Beschreibung: | xv, 247 pages illustrations 23 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047657758 | ||
003 | DE-604 | ||
005 | 20220207 | ||
007 | t | ||
008 | 220104s2021 a||| |||| 00||| eng d | ||
015 | |a GBC1D1599 |2 dnb | ||
020 | |z 1098101391 |9 1-098-10139-1 | ||
020 | |z 9781098101398 |9 978-1-098-10139-8 | ||
035 | |a (OCoLC)1296321181 | ||
035 | |a (DE-599)BVBBV047657758 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a 97 things every information security professional should know |b collective wisdom from the experts |c edited by Christina Morillo |
250 | |a First edition | ||
264 | 1 | |a Sebastopol, California |b O'Reilly Media, Inc. |c ©2021 | |
300 | |a xv, 247 pages |b illustrations |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | |a Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll leaern how to expand your skills and solve common issues by working through everyday security problems. You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field - back cover | ||
650 | 4 | |a Computer security / Vocational guidance | |
650 | 4 | |a Computer networks / Security measures / Vocational guidance | |
650 | 4 | |a Data protection / Vocational guidance | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Morillo, Christina |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1251268080 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033042650&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033042650 |
Datensatz im Suchindex
_version_ | 1804183126660874240 |
---|---|
adam_text | Table of Contents Preface............................................................................... xiii 1. Continuously Learn to Protect Tomorrow’s Technology............................................................................ 1 Alyssa Columbus 2. Fight in Cyber like the Military Fights in the Physical...... 3 Andrew Harris 3. Three Major Planes.............................................................. 6 Andrew Harris 4. InfoSec Professionals Need to Know Operational Resilience............................................................................... 9 Ann Johnson 5. Taking Control of Your Own Journey.............................. 11 Antoine Middleton 6. Security, Privacy, and Messy Data Webs: Taking Back Control in Third-PartyEnvironments....................... 13 Ben Brook 7. Every Information Security Problem Boils Down to One Thing........................................................................... 15 Ben Smith iii
8. And in This Corner, It’s Security Versus the Business!... 17 Ben Smith 9. Don’t Overlook Prior Art from Other Industries............. 19 Ben Smith 10. Powerful Metrics Always Lose to Poor Communication....................................................................21 Ben Smith 11. “No” May Not Be a Strategic Word................................. 23 Brian Gibbs 12. Keep People at the Center of Your Work....................... 25 Camille Stewart 13. Take a Beat: Thinking Like a Firefighter for Better Incident Response............................................................ 27 Catherine J. Ullman 14. A Diverse Path to Better Security Professionals.............29 Catherine J. Ullman 15. It’s Not About the Tools.................................................... 31 Chase Pettet 16. Four Things to Know About Cybersecurity.................... 33 Chloé Messdaghi 17. Vetting Resources and Having Patience when Learning Information Security Topics............................. 36 Christina Lang 18. Focus on the What and the Why First, Not the Tool.... 38 Christina Morillo 19. Insiders Don’t Care for Controls....................................... 40 Damian Finol IV Table of Contents
20. Identity and Access Management: The Value of User Experience......................................................................... 42 Dane Bamburry 21. Lessons from Cross-Training in Law................................ 44 Danny Moules 22. Ransomware...................................................................... 46 David McKenzie 23. The Key to Success in Your Cloud Journey Begins with the Shared Responsibility Model............................. 48 Dominique West 24. Why InfoSec Practitioners Need to Know About Agile and DevOps.............................................................. 50 Fernando Ike 25. The Business Is Always Right......................................... 53 Frank McGovern 26. Why Choose Linux as Your Secure Operating System?............................................................................. 55 Gleydson Mazioli da Silva 27. New World, New Rules, Same Principles........................ 57 Guillaume Blaquiere 28. Data Protection: Impact on Software Development...... 59 Guy Lépine 29. An Introduction to Security in the Cloud........................ 62 Gwyneth Peña-Siguenza 30. Knowing Normal............................................................... 65 Gyle dela Cruz 31. All Signs Point to a Schism in Cybersecurity...................67 Ian Barwise Table of Contents v
32. DevSecOps Is Evolving to Drive a Risk-Based Digital Transformation.................................................................. 69 Idan Plotnik 33. Availability Is a Security Concern Too............................. 71 Jam Leomi 34. Security Is People.............................................................. 73 James Bore 35. Penetration Testing: Why Can’t It Be Like the Movies?!.............................................................................. 75 Jasmine M. Jackson 36. How Many Ingredients Does It Take to Make an Information Security Professional?................................... 77 Jasmine M. Jackson 37. Understanding Open Source Licensing and Security.... 79 Jeff Łuszcz 38. Planning for Incident Response Customer Notifications...................................................................... 81 JR Aquino 39. Managing Security Alert Fatigue..................................... 84 Julie Agnes Sparks 40. Take Advantage of NIST’s Resources................................86 Karen Scarfone 41. Apply Agile SDLC Methodology to Your Career........... 88 Keirsten Brager 42. Failing Spectacularly........................................................... 90 Kelly Shortridge 43. The Solid Impact of Soft Skills.......................................... 92 Kim Z. Dale vi Table of Contents
44. What Is Good Cyber Hygiene Within Information Security?............................................................................ 94 Lauren Zink 45. Phishing.............................................................................. 96 Lauren Zink 46. Building a New Security Program.................................... 98 Lauren Zink 47. Using Isolation Zones to Increase Cloud Security......... 100 Lee Atchison 48. If It’s Remembered for You, Forensics Can Uncover It......................................................................... 103 Lodrina Cherne 49. Certifications Considered Harmful................................. 105 Louis Nyffenegger 50. Security Considerations for loT Device Management.. 107 Mansi Ѣіакаг 51. Lessons Learned: Cybersecurity Road Trip.................. 109 Mansi Ѣіакаг 52. Finding Your Voice......................................................... 111 Maresa Vermalst 53. Best Practices with Vulnerability Management............. 113 Mari Galloway 54. Social Engineering........................................................... 115 Marina Ciavatta 55. Stalkerware: When Malware and Domestic Abuse Coincide............................................................................ 117 Martijn Grooten Table of Contents vii
56. Understanding and Exploring Risk................................. 119 Dr. Meg Layton 57. The Psychology of Incident Response.......................... 121 Melanie Ensign 58. Priorities and Ethics/Morality........................................ 123 Michael Weber 59. DevSecOps: Continuous Security Has Come to Stay... 125 Michelle Ribeiro 60. Cloud Security: A 5,000 Mile View from the Top.......... 128 Michelle Taggart 61. Balancing the Risk and Productivity of Browser Extensions........................................................................ 130 Mike Mackintosh 62. Technical Project Ideas Towards Learning Web Application Security........................................................ 132 Ming Chow 63. Monitoring: You Can’t Defend Against What You Don’t See........................................................................... 134 Mitch B. Parker 64. Documentation Matters.................................................. 136 Najla Lindsay 65. The Dirty Truth Behind Breaking into Cybersecurity... 137 Naomi Buckwalter 66. Cloud Security.................................................................. 139 Nathan Chung 67. Empathy and Change..................................................... 141 Nick Gordon viii Table of Contents
68. Information Security Ever After..................................... 143 Nicole Dorsett 69. Don’t Check It In!.............................................................. 145 Patrick Schiess 70. Threat Modeling for SIEM Alerts.................................... 147 Phil Swaim 71. Security Incident Response and Career Longevity...... 149 Priscilla Li 72. Incident Management..................................................... 151 Quiessence Phillips 73. Structure over Chaos....................................................... 153 Rob Newby 74. CWE Top 25 Most Dangerous Software Weaknesses.. 155 Rushi Purohit 75. Threat Hunting Based on Machine Learning................. 157 Saju Thomas Paul and Harshvardhan Parmar 76. Get In Where You Fit In.................................................. 159 Sallie Newton 77. Look Inside and See What Can Be................................. 161 Sam Denard 78. DevOps for InfoSec Professionals.................................. 164 Sasha Rosenbaum 79. Get Familiar with R R (Risk and Resilience)................. 167 Shinesa Cambric 80. Password Management.................................................. 169 Siggi Bjarnason Table of Contents ix
81. Let’s Go Phishing.............................................................. 171 Siggi Bjarnason 82. Vulnerability Management.............................................. 173 Siggi Bjarnason 83. Reduce Insider Risk Through Employee Empowerment.................................................................. 175 Stacey Champagne 84. Fitting Certifications into Your Career Path................. 178 Steven Becker 85. Phishing Reporting Is the Best Detection...................... 180 Steven Becker 86. Know Your Data............................................................... 182 Steve Taylor 87. Don’t Let the Cybersecurity Talent Shortage Leave Your Firm Vulnerable....................................................... 184 Tim Maliyil 88. Comfortable Versus Confident....................................... 186 Tkay Rice 89. Some Thoughts on PKI.................................................... 188 Tarah Wheeler 90. What Is a Security Champion?....................................... 190 Travis E Felder 91. Risk Management in Information Security.................... 193 Trevor Bryant 92. Risk, 2FA, MFA, It’s All Just Authentication! Isn’t It?... 195 Unique Glover x Table of Contents
93. Things I Wish I Knew Before Getting into Cybersecurity.................................................................... 197 Valentina Palacin 94. Research Is Not Just for Paper Writing........................ 199 Vanessa Redman 95. The Security Practitioner.................................................201 Wayne A. Howell Jr. 96. Threat Intelligence inTwo Steps..................................... 203 Xena Olsen 97. Maintaining Compliance and Information Security with Blue Team Assistance............................................ 205 Yasmin Schlegel Contributors..................................................................... 207 Index....................................................................................241 About the Editor.............................................................. 248 Table of Contents xi
|
adam_txt |
Table of Contents Preface. xiii 1. Continuously Learn to Protect Tomorrow’s Technology. 1 Alyssa Columbus 2. Fight in Cyber like the Military Fights in the Physical. 3 Andrew Harris 3. Three Major Planes. 6 Andrew Harris 4. InfoSec Professionals Need to Know Operational Resilience. 9 Ann Johnson 5. Taking Control of Your Own Journey. 11 Antoine Middleton 6. Security, Privacy, and Messy Data Webs: Taking Back Control in Third-PartyEnvironments. 13 Ben Brook 7. Every Information Security Problem Boils Down to One Thing. 15 Ben Smith iii
8. And in This Corner, It’s Security Versus the Business!. 17 Ben Smith 9. Don’t Overlook Prior Art from Other Industries. 19 Ben Smith 10. Powerful Metrics Always Lose to Poor Communication.21 Ben Smith 11. “No” May Not Be a Strategic Word. 23 Brian Gibbs 12. Keep People at the Center of Your Work. 25 Camille Stewart 13. Take a Beat: Thinking Like a Firefighter for Better Incident Response. 27 Catherine J. Ullman 14. A Diverse Path to Better Security Professionals.29 Catherine J. Ullman 15. It’s Not About the Tools. 31 Chase Pettet 16. Four Things to Know About Cybersecurity. 33 Chloé Messdaghi 17. Vetting Resources and Having Patience when Learning Information Security Topics. 36 Christina Lang 18. Focus on the What and the Why First, Not the Tool. 38 Christina Morillo 19. Insiders Don’t Care for Controls. 40 Damian Finol IV Table of Contents
20. Identity and Access Management: The Value of User Experience. 42 Dane Bamburry 21. Lessons from Cross-Training in Law. 44 Danny Moules 22. Ransomware. 46 David McKenzie 23. The Key to Success in Your Cloud Journey Begins with the Shared Responsibility Model. 48 Dominique West 24. Why InfoSec Practitioners Need to Know About Agile and DevOps. 50 Fernando Ike 25. The Business Is Always Right. 53 Frank McGovern 26. Why Choose Linux as Your Secure Operating System?. 55 Gleydson Mazioli da Silva 27. New World, New Rules, Same Principles. 57 Guillaume Blaquiere 28. Data Protection: Impact on Software Development. 59 Guy Lépine 29. An Introduction to Security in the Cloud. 62 Gwyneth Peña-Siguenza 30. Knowing Normal. 65 Gyle dela Cruz 31. All Signs Point to a Schism in Cybersecurity.67 Ian Barwise Table of Contents v
32. DevSecOps Is Evolving to Drive a Risk-Based Digital Transformation. 69 Idan Plotnik 33. Availability Is a Security Concern Too. 71 Jam Leomi 34. Security Is People. 73 James Bore 35. Penetration Testing: Why Can’t It Be Like the Movies?!. 75 Jasmine M. Jackson 36. How Many Ingredients Does It Take to Make an Information Security Professional?. 77 Jasmine M. Jackson 37. Understanding Open Source Licensing and Security. 79 Jeff Łuszcz 38. Planning for Incident Response Customer Notifications. 81 JR Aquino 39. Managing Security Alert Fatigue. 84 Julie Agnes Sparks 40. Take Advantage of NIST’s Resources.86 Karen Scarfone 41. Apply Agile SDLC Methodology to Your Career. 88 Keirsten Brager 42. Failing Spectacularly. 90 Kelly Shortridge 43. The Solid Impact of Soft Skills. 92 Kim Z. Dale vi Table of Contents
44. What Is Good Cyber Hygiene Within Information Security?. 94 Lauren Zink 45. Phishing. 96 Lauren Zink 46. Building a New Security Program. 98 Lauren Zink 47. Using Isolation Zones to Increase Cloud Security. 100 Lee Atchison 48. If It’s Remembered for You, Forensics Can Uncover It. 103 Lodrina Cherne 49. Certifications Considered Harmful. 105 Louis Nyffenegger 50. Security Considerations for loT Device Management. 107 Mansi Ѣіакаг 51. Lessons Learned: Cybersecurity Road Trip. 109 Mansi Ѣіакаг 52. Finding Your Voice. 111 Maresa Vermalst 53. Best Practices with Vulnerability Management. 113 Mari Galloway 54. Social Engineering. 115 Marina Ciavatta 55. Stalkerware: When Malware and Domestic Abuse Coincide. 117 Martijn Grooten Table of Contents vii
56. Understanding and Exploring Risk. 119 Dr. Meg Layton 57. The Psychology of Incident Response. 121 Melanie Ensign 58. Priorities and Ethics/Morality. 123 Michael Weber 59. DevSecOps: Continuous Security Has Come to Stay. 125 Michelle Ribeiro 60. Cloud Security: A 5,000 Mile View from the Top. 128 Michelle Taggart 61. Balancing the Risk and Productivity of Browser Extensions. 130 Mike Mackintosh 62. Technical Project Ideas Towards Learning Web Application Security. 132 Ming Chow 63. Monitoring: You Can’t Defend Against What You Don’t See. 134 Mitch B. Parker 64. Documentation Matters. 136 Najla Lindsay 65. The Dirty Truth Behind Breaking into Cybersecurity. 137 Naomi Buckwalter 66. Cloud Security. 139 Nathan Chung 67. Empathy and Change. 141 Nick Gordon viii Table of Contents
68. Information Security Ever After. 143 Nicole Dorsett 69. Don’t Check It In!. 145 Patrick Schiess 70. Threat Modeling for SIEM Alerts. 147 Phil Swaim 71. Security Incident Response and Career Longevity. 149 Priscilla Li 72. Incident Management. 151 Quiessence Phillips 73. Structure over Chaos. 153 Rob Newby 74. CWE Top 25 Most Dangerous Software Weaknesses. 155 Rushi Purohit 75. Threat Hunting Based on Machine Learning. 157 Saju Thomas Paul and Harshvardhan Parmar 76. Get In Where You Fit In. 159 Sallie Newton 77. Look Inside and See What Can Be. 161 Sam Denard 78. DevOps for InfoSec Professionals. 164 Sasha Rosenbaum 79. Get Familiar with R R (Risk and Resilience). 167 Shinesa Cambric 80. Password Management. 169 Siggi Bjarnason Table of Contents ix
81. Let’s Go Phishing. 171 Siggi Bjarnason 82. Vulnerability Management. 173 Siggi Bjarnason 83. Reduce Insider Risk Through Employee Empowerment. 175 Stacey Champagne 84. Fitting Certifications into Your Career Path. 178 Steven Becker 85. Phishing Reporting Is the Best Detection. 180 Steven Becker 86. Know Your Data. 182 Steve Taylor 87. Don’t Let the Cybersecurity Talent Shortage Leave Your Firm Vulnerable. 184 Tim Maliyil 88. Comfortable Versus Confident. 186 Tkay Rice 89. Some Thoughts on PKI. 188 Tarah Wheeler 90. What Is a Security Champion?. 190 Travis E Felder 91. Risk Management in Information Security. 193 Trevor Bryant 92. Risk, 2FA, MFA, It’s All Just Authentication! Isn’t It?. 195 Unique Glover x Table of Contents
93. Things I Wish I Knew Before Getting into Cybersecurity. 197 Valentina Palacin 94. Research Is Not Just for Paper Writing. 199 Vanessa Redman 95. The Security Practitioner.201 Wayne A. Howell Jr. 96. Threat Intelligence inTwo Steps. 203 Xena Olsen 97. Maintaining Compliance and Information Security with Blue Team Assistance. 205 Yasmin Schlegel Contributors. 207 Index.241 About the Editor. 248 Table of Contents xi |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)1251268080 |
building | Verbundindex |
bvnumber | BV047657758 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1296321181 (DE-599)BVBBV047657758 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02451nam a2200397 c 4500</leader><controlfield tag="001">BV047657758</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220104s2021 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC1D1599</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1098101391</subfield><subfield code="9">1-098-10139-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781098101398</subfield><subfield code="9">978-1-098-10139-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1296321181</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047657758</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">97 things every information security professional should know</subfield><subfield code="b">collective wisdom from the experts</subfield><subfield code="c">edited by Christina Morillo</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, California</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 247 pages</subfield><subfield code="b">illustrations</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll leaern how to expand your skills and solve common issues by working through everyday security problems. You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field - back cover</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Vocational guidance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Vocational guidance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Vocational guidance</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morillo, Christina</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1251268080</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033042650&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033042650</subfield></datafield></record></collection> |
id | DE-604.BV047657758 |
illustrated | Illustrated |
index_date | 2024-07-03T18:51:37Z |
indexdate | 2024-07-10T09:18:29Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033042650 |
oclc_num | 1296321181 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xv, 247 pages illustrations 23 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | 97 things every information security professional should know collective wisdom from the experts edited by Christina Morillo First edition Sebastopol, California O'Reilly Media, Inc. ©2021 xv, 247 pages illustrations 23 cm txt rdacontent n rdamedia nc rdacarrier Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll leaern how to expand your skills and solve common issues by working through everyday security problems. You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field - back cover Computer security / Vocational guidance Computer networks / Security measures / Vocational guidance Data protection / Vocational guidance Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Morillo, Christina ca. 20./21. Jh. Sonstige (DE-588)1251268080 oth Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033042650&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | 97 things every information security professional should know collective wisdom from the experts Computer security / Vocational guidance Computer networks / Security measures / Vocational guidance Data protection / Vocational guidance Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | 97 things every information security professional should know collective wisdom from the experts |
title_auth | 97 things every information security professional should know collective wisdom from the experts |
title_exact_search | 97 things every information security professional should know collective wisdom from the experts |
title_exact_search_txtP | 97 things every information security professional should know collective wisdom from the experts |
title_full | 97 things every information security professional should know collective wisdom from the experts edited by Christina Morillo |
title_fullStr | 97 things every information security professional should know collective wisdom from the experts edited by Christina Morillo |
title_full_unstemmed | 97 things every information security professional should know collective wisdom from the experts edited by Christina Morillo |
title_short | 97 things every information security professional should know |
title_sort | 97 things every information security professional should know collective wisdom from the experts |
title_sub | collective wisdom from the experts |
topic | Computer security / Vocational guidance Computer networks / Security measures / Vocational guidance Data protection / Vocational guidance Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security / Vocational guidance Computer networks / Security measures / Vocational guidance Data protection / Vocational guidance Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033042650&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT morillochristina 97thingseveryinformationsecurityprofessionalshouldknowcollectivewisdomfromtheexperts |