Linked e-resources
Details
Table of Contents
Chapter 1: The Problem We Are Facing
Chapter 2 : Protecting Critical Assets
Chapter 3: Monetizing Risk
Chapter 4: Security Intelligence Model
Chapter 5: Incident Response Planning
Chapter 6: The People Problem
Chapter 7: Assigning Accountability
Chapter 8: Shifting the Paradigm
Chapter 9: The Definition of Insanity
Chapter 10: Déjà Vu
Chapter 11: The Information Security Community
Chapter 12: Partnering with Governments
Chapter 2 : Protecting Critical Assets
Chapter 3: Monetizing Risk
Chapter 4: Security Intelligence Model
Chapter 5: Incident Response Planning
Chapter 6: The People Problem
Chapter 7: Assigning Accountability
Chapter 8: Shifting the Paradigm
Chapter 9: The Definition of Insanity
Chapter 10: Déjà Vu
Chapter 11: The Information Security Community
Chapter 12: Partnering with Governments