000727293 000__ 03785cam\a2200505Ii\4500 000727293 001__ 727293 000727293 005__ 20230306140810.0 000727293 006__ m\\\\\o\\d\\\\\\\\ 000727293 007__ cr\cn\nnnunnun 000727293 008__ 150527s2015\\\\caua\\\\ob\\\\001\0\eng\d 000727293 019__ $$a911430840 000727293 020__ $$a9781430260837$$qelectronic book 000727293 020__ $$a1430260831$$qelectronic book 000727293 020__ $$z9781430260820 000727293 0247_ $$a10.1007/978-1-4302-6083-7$$2doi 000727293 035__ $$aSP(OCoLC)ocn910159354 000727293 035__ $$aSP(OCoLC)910159354$$z(OCoLC)911430840 000727293 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dOCLCO$$dIDEBK$$dYDXCP$$dCDX$$dE7B$$dCOO$$dUMI$$dDEBBG$$dVLB 000727293 049__ $$aISEA 000727293 050_4 $$aTK5105.875.I57$$bD65 2015eb 000727293 08204 $$a005.8$$223 000727293 1001_ $$aDonaldson, Scott E.,$$eauthor. 000727293 24510 $$aEnterprise cybersecurity$$h[electronic resource] :$$bhow to build a successful cyberdefense program against advanced threats /$$cScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam. 000727293 264_1 $$a[Berkeley, CA] :$$bApress,$$c[2015] 000727293 264_4 $$c©2015 000727293 300__ $$a1 online resource :$$billustrations. 000727293 336__ $$atext$$btxt$$2rdacontent 000727293 337__ $$acomputer$$bc$$2rdamedia 000727293 338__ $$aonline resource$$bcr$$2rdacarrier 000727293 4901_ $$aThe expert's voice in cybersecurity 000727293 504__ $$aIncludes bibliographical references and index. 000727293 506__ $$aAccess limited to authorized users. 000727293 520__ $$aEnterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. 000727293 588__ $$aOnline resource; title from PDF title page (viewed May 28, 2015) 000727293 650_0 $$aInternet$$xSecurity measures. 000727293 650_0 $$aComputer security. 000727293 7001_ $$aSiegel, Stanley G.,$$eauthor. 000727293 7001_ $$aWilliams, Chris K.,$$eauthor. 000727293 7001_ $$aAslam, Abdul,$$eauthor. 000727293 77608 $$iPrint version:$$z9781430260820 000727293 830_0 $$aExpert's voice in cybersecurity. 000727293 852__ $$bebk 000727293 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4302-6083-7$$zOnline Access$$91397441.1 000727293 909CO $$ooai:library.usi.edu:727293$$pGLOBAL_SET 000727293 980__ $$aEBOOK 000727293 980__ $$aBIB 000727293 982__ $$aEbook 000727293 983__ $$aOnline 000727293 994__ $$a92$$bISE