The cybersecurity playbook for modern enterprises :: an end-to-end guide to preventing data breaches and cyber attacks /
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2023.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. |
Beschreibung: | Description based upon print version of record. |
Beschreibung: | 1 online resource (280 p.) |
ISBN: | 1803237554 9781803237558 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1299388332 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 220226s2023 xx o 000 0 eng d | ||
040 | |a EBLCP |b eng |c EBLCP |d N$T |d OCLCO |d OCLCF |d NBJ |d OCLCQ |d OCL |d IEEEE |d OCLCO | ||
019 | |a 1298387703 | ||
020 | |a 1803237554 | ||
020 | |a 9781803237558 |q (electronic bk.) | ||
035 | |a (OCoLC)1299388332 |z (OCoLC)1298387703 | ||
037 | |a 10162310 |b IEEE | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 658.478 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Wittkop, Jeremy. | |
245 | 1 | 4 | |a The cybersecurity playbook for modern enterprises : |b an end-to-end guide to preventing data breaches and cyber attacks / |c Jeremy Wittkop. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2023. | ||
300 | |a 1 online resource (280 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
520 | |a Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. | ||
505 | 0 | |a Table of Contents Protecting People, Information, and Systems - a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home. | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Gestion |x Informatique |x Sécurité |x Mesures. | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
776 | 0 | 8 | |i Print version: |a Wittkop, Jeremy |t The Cybersecurity Playbook for Modern Enterprises |d Birmingham : Packt Publishing, Limited,c2023 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3166587 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3166587 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6885982 | ||
938 | |a EBSCOhost |b EBSC |n 3166587 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1299388332 |
---|---|
_version_ | 1829095367678885888 |
adam_text | |
any_adam_object | |
author | Wittkop, Jeremy |
author_facet | Wittkop, Jeremy |
author_role | |
author_sort | Wittkop, Jeremy |
author_variant | j w jw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Protecting People, Information, and Systems - a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home. |
ctrlnum | (OCoLC)1299388332 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03798cam a2200493Mu 4500</leader><controlfield tag="001">ZDB-4-EBA-on1299388332</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">220226s2023 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="c">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NBJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1298387703</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803237554</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803237558</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1299388332</subfield><subfield code="z">(OCoLC)1298387703</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10162310</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wittkop, Jeremy.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The cybersecurity playbook for modern enterprises :</subfield><subfield code="b">an end-to-end guide to preventing data breaches and cyber attacks /</subfield><subfield code="c">Jeremy Wittkop.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (280 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Protecting People, Information, and Systems - a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion</subfield><subfield code="x">Informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Wittkop, Jeremy</subfield><subfield code="t">The Cybersecurity Playbook for Modern Enterprises</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2023</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3166587</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3166587</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6885982</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3166587</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1299388332 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:47:54Z |
institution | BVB |
isbn | 1803237554 9781803237558 |
language | English |
oclc_num | 1299388332 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (280 p.) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Wittkop, Jeremy. The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / Jeremy Wittkop. Birmingham : Packt Publishing, Limited, 2023. 1 online resource (280 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based upon print version of record. Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. Table of Contents Protecting People, Information, and Systems - a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer crimes Prevention. Business Data processing Security measures. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Gestion Informatique Sécurité Mesures. Computer crimes Prevention fast Business Data processing Security measures fast Computer security fast Print version: Wittkop, Jeremy The Cybersecurity Playbook for Modern Enterprises Birmingham : Packt Publishing, Limited,c2023 |
spellingShingle | Wittkop, Jeremy The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / Table of Contents Protecting People, Information, and Systems - a Growing Problem The Human Side of Cybersecurity Anatomy of an Attack Protecting People, Information, and Systems with Timeless Best Practices Protecting against Common Attacks by Partnering with End Users Information Security for a Changing World Difficulty Securing the Modern Enterprise (with Solutions!) Harnessing Automation Opportunities Cybersecurity at Home. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer crimes Prevention. Business Data processing Security measures. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Gestion Informatique Sécurité Mesures. Computer crimes Prevention fast Business Data processing Security measures fast Computer security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 https://id.nlm.nih.gov/mesh/D016494 |
title | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / |
title_auth | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / |
title_exact_search | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / |
title_full | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / Jeremy Wittkop. |
title_fullStr | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / Jeremy Wittkop. |
title_full_unstemmed | The cybersecurity playbook for modern enterprises : an end-to-end guide to preventing data breaches and cyber attacks / Jeremy Wittkop. |
title_short | The cybersecurity playbook for modern enterprises : |
title_sort | cybersecurity playbook for modern enterprises an end to end guide to preventing data breaches and cyber attacks |
title_sub | an end-to-end guide to preventing data breaches and cyber attacks / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer crimes Prevention. Business Data processing Security measures. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Gestion Informatique Sécurité Mesures. Computer crimes Prevention fast Business Data processing Security measures fast Computer security fast |
topic_facet | Computer security. Computer crimes Prevention. Business Data processing Security measures. Computer Security Sécurité informatique. Gestion Informatique Sécurité Mesures. Computer crimes Prevention Business Data processing Security measures Computer security |
work_keys_str_mv | AT wittkopjeremy thecybersecurityplaybookformodernenterprisesanendtoendguidetopreventingdatabreachesandcyberattacks AT wittkopjeremy cybersecurityplaybookformodernenterprisesanendtoendguidetopreventingdatabreachesandcyberattacks |