Advances in cybersecurity management / Kevin Daimi, Cathryn Peoples, editors.
2021
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Advances in cybersecurity management / Kevin Daimi, Cathryn Peoples, editors.
ISBN
9783030713812 (electronic bk.)
3030713814 (electronic bk.)
3030713806
9783030713805
3030713814 (electronic bk.)
3030713806
9783030713805
Publication Details
Cham : Springer, 2021.
Language
English
Description
1 online resource
Item Number
10.1007/978-3-030-71381-2 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists. Provides a professional development resource for educators and practitioners on the state-of-the-art cybersecurity management materials; Contributes towards the enhancement of the community outreach and engagement component of cybersecurity management; Introduces various techniques, methods, and approaches adopted by cybersecurity management experts.
Note
Includes index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed June 30, 2021).
Added Author
Daimi, Kevin, editor.
Peoples, Cathryn, editor.
Peoples, Cathryn, editor.
Available in Other Form
Print version: 9783030713805
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Introduction
Management Techniques in Cybersecurity
Information Technology Risk Management
Impact of Technologies and Techniques on Cybersecurity Management
Regulatory Techniques and Issues
International Issues Related to Security Management
IT Compliance Management
Security Policy Management
IT Vendor Risk Management
Cyber Security Incident Response
Compliance Requirements for Cyber Security
Information Continuity Management
Assets Classification and Control
Conclusion.
Management Techniques in Cybersecurity
Information Technology Risk Management
Impact of Technologies and Techniques on Cybersecurity Management
Regulatory Techniques and Issues
International Issues Related to Security Management
IT Compliance Management
Security Policy Management
IT Vendor Risk Management
Cyber Security Incident Response
Compliance Requirements for Cyber Security
Information Continuity Management
Assets Classification and Control
Conclusion.