Information security handbook: enhance your proficiency in information security program development
Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is d...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing
October 2023
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | FHD01 |
Zusammenfassung: | Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner |
Beschreibung: | 1 Online-Ressource (xxi, 347 Seiten) |
ISBN: | 9781837636075 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049521164 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 240129s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781837636075 |9 978-1-83763-607-5 | ||
035 | |a (OCoLC)1422443166 | ||
035 | |a (DE-599)BVBBV049521164 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 | ||
100 | 1 | |a Death, Darren |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security handbook |b enhance your proficiency in information security program development |c Darren Death |
250 | |a Second edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing |c October 2023 | |
300 | |a 1 Online-Ressource (xxi, 347 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape | |
505 | 8 | |a Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary | |
505 | 8 | |a Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity | |
505 | 8 | |a Information security policies -- Information security program policy -- Enterprise information security policies -- Information security system-specific policy -- Planning policy -- Access controls policy -- Awareness and training policy -- Auditing and accountability policy -- Configuration management policy -- Contingency planning policy -- Identification and authentication policy -- Incident response policy -- Maintenance policy -- Media protection policy -- Personnel security policy -- Physical and environmental protection policy -- Risk assessment policy | |
505 | 8 | |a Assessment, authorization, and monitoring policy -- System and communications protection policy -- System and information integrity policy -- Systems and services acquisitions policy -- Personally identifiable information policy -- Supply chain risk management policy -- Summary -- Chapter 4: Information Security Risk Management -- What is information security risk? -- Understanding the ownership and management of information security risk -- Identifying and protecting your organization's valuable data -- Conducting a quick risk assessment -- Risk management is an organizational-wide activity | |
520 | |a Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Information technology / Management | |
650 | 4 | |a Industries / Security measures | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Technologie de l'information / Sécurité / Mesures | |
650 | 4 | |a Technologie de l'information / Gestion | |
650 | 4 | |a Industrie / Sécurité / Mesures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-83763-270-1 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034867008 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30789313 |l FHD01 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186343138394112 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Death, Darren |
author_facet | Death, Darren |
author_role | aut |
author_sort | Death, Darren |
author_variant | d d dd |
building | Verbundindex |
bvnumber | BV049521164 |
collection | ZDB-30-PQE |
contents | Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity Information security policies -- Information security program policy -- Enterprise information security policies -- Information security system-specific policy -- Planning policy -- Access controls policy -- Awareness and training policy -- Auditing and accountability policy -- Configuration management policy -- Contingency planning policy -- Identification and authentication policy -- Incident response policy -- Maintenance policy -- Media protection policy -- Personnel security policy -- Physical and environmental protection policy -- Risk assessment policy Assessment, authorization, and monitoring policy -- System and communications protection policy -- System and information integrity policy -- Systems and services acquisitions policy -- Personally identifiable information policy -- Supply chain risk management policy -- Summary -- Chapter 4: Information Security Risk Management -- What is information security risk? -- Understanding the ownership and management of information security risk -- Identifying and protecting your organization's valuable data -- Conducting a quick risk assessment -- Risk management is an organizational-wide activity |
ctrlnum | (OCoLC)1422443166 (DE-599)BVBBV049521164 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05837nmm a2200469 c 4500</leader><controlfield tag="001">BV049521164</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240129s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837636075</subfield><subfield code="9">978-1-83763-607-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422443166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049521164</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Death, Darren</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security handbook</subfield><subfield code="b">enhance your proficiency in information security program development</subfield><subfield code="c">Darren Death</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">October 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 347 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Information security policies -- Information security program policy -- Enterprise information security policies -- Information security system-specific policy -- Planning policy -- Access controls policy -- Awareness and training policy -- Auditing and accountability policy -- Configuration management policy -- Contingency planning policy -- Identification and authentication policy -- Incident response policy -- Maintenance policy -- Media protection policy -- Personnel security policy -- Physical and environmental protection policy -- Risk assessment policy</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Assessment, authorization, and monitoring policy -- System and communications protection policy -- System and information integrity policy -- Systems and services acquisitions policy -- Personally identifiable information policy -- Supply chain risk management policy -- Summary -- Chapter 4: Information Security Risk Management -- What is information security risk? -- Understanding the ownership and management of information security risk -- Identifying and protecting your organization's valuable data -- Conducting a quick risk assessment -- Risk management is an organizational-wide activity</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information / Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrie / Sécurité / Mesures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-83763-270-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034867008</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30789313</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049521164 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:25:01Z |
indexdate | 2024-07-10T10:09:37Z |
institution | BVB |
isbn | 9781837636075 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034867008 |
oclc_num | 1422443166 |
open_access_boolean | |
owner | DE-1050 |
owner_facet | DE-1050 |
physical | 1 Online-Ressource (xxi, 347 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Death, Darren Verfasser aut Information security handbook enhance your proficiency in information security program development Darren Death Second edition Birmingham ; Mumbai Packt Publishing October 2023 1 Online-Ressource (xxi, 347 Seiten) txt rdacontent c rdamedia cr rdacarrier Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity Information security policies -- Information security program policy -- Enterprise information security policies -- Information security system-specific policy -- Planning policy -- Access controls policy -- Awareness and training policy -- Auditing and accountability policy -- Configuration management policy -- Contingency planning policy -- Identification and authentication policy -- Incident response policy -- Maintenance policy -- Media protection policy -- Personnel security policy -- Physical and environmental protection policy -- Risk assessment policy Assessment, authorization, and monitoring policy -- System and communications protection policy -- System and information integrity policy -- Systems and services acquisitions policy -- Personally identifiable information policy -- Supply chain risk management policy -- Summary -- Chapter 4: Information Security Risk Management -- What is information security risk? -- Understanding the ownership and management of information security risk -- Identifying and protecting your organization's valuable data -- Conducting a quick risk assessment -- Risk management is an organizational-wide activity Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner Computer networks / Security measures Information technology / Security measures Information technology / Management Industries / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Technologie de l'information / Sécurité / Mesures Technologie de l'information / Gestion Industrie / Sécurité / Mesures Erscheint auch als Druck-Ausgabe 978-1-83763-270-1 |
spellingShingle | Death, Darren Information security handbook enhance your proficiency in information security program development Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Introduction -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- Information technology security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Information security policies -- Information security training -- Summary -- Chapter 2: Defining the Threat Landscape Understanding the organizational context -- Threats -- Phishing attacks -- Ransomware -- Malware -- Distributed denial-of-service attacks -- Insider threats -- Advanced Persistent Threats -- Social engineering attacks -- Supply chain attacks -- Hackers and hacking -- White hat/ethical hacker -- Black hat hacker -- Gray hat hacker -- Blue hat hacker -- Script kiddie -- Hacktivist -- Nation-state attacker -- Penetration testing -- Cybercrime -- Exploits -- Hacker techniques -- Closing information system vulnerabilities -- Vulnerability management -- Summary Chapter 3: Laying a Foundation for Information and Data Security -- Developing a comprehensive information security program -- Leveraging existing frameworks instead of building from scratch -- Essential factors for information security program success -- Aligning information security with the organization's mission -- Optimizing information security measures for your organization -- Enhancing security through comprehensive awareness and training programs -- Building information security into the SDLC/SELC process -- Understanding and enhancing your information security program maturity Information security policies -- Information security program policy -- Enterprise information security policies -- Information security system-specific policy -- Planning policy -- Access controls policy -- Awareness and training policy -- Auditing and accountability policy -- Configuration management policy -- Contingency planning policy -- Identification and authentication policy -- Incident response policy -- Maintenance policy -- Media protection policy -- Personnel security policy -- Physical and environmental protection policy -- Risk assessment policy Assessment, authorization, and monitoring policy -- System and communications protection policy -- System and information integrity policy -- Systems and services acquisitions policy -- Personally identifiable information policy -- Supply chain risk management policy -- Summary -- Chapter 4: Information Security Risk Management -- What is information security risk? -- Understanding the ownership and management of information security risk -- Identifying and protecting your organization's valuable data -- Conducting a quick risk assessment -- Risk management is an organizational-wide activity Computer networks / Security measures Information technology / Security measures Information technology / Management Industries / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Technologie de l'information / Sécurité / Mesures Technologie de l'information / Gestion Industrie / Sécurité / Mesures |
title | Information security handbook enhance your proficiency in information security program development |
title_auth | Information security handbook enhance your proficiency in information security program development |
title_exact_search | Information security handbook enhance your proficiency in information security program development |
title_exact_search_txtP | Information security handbook enhance your proficiency in information security program development |
title_full | Information security handbook enhance your proficiency in information security program development Darren Death |
title_fullStr | Information security handbook enhance your proficiency in information security program development Darren Death |
title_full_unstemmed | Information security handbook enhance your proficiency in information security program development Darren Death |
title_short | Information security handbook |
title_sort | information security handbook enhance your proficiency in information security program development |
title_sub | enhance your proficiency in information security program development |
topic | Computer networks / Security measures Information technology / Security measures Information technology / Management Industries / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Technologie de l'information / Sécurité / Mesures Technologie de l'information / Gestion Industrie / Sécurité / Mesures |
topic_facet | Computer networks / Security measures Information technology / Security measures Information technology / Management Industries / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Technologie de l'information / Sécurité / Mesures Technologie de l'information / Gestion Industrie / Sécurité / Mesures |
work_keys_str_mv | AT deathdarren informationsecurityhandbookenhanceyourproficiencyininformationsecurityprogramdevelopment |