000827118 000__ 03163cam\a2200517Ii\4500 000827118 001__ 827118 000827118 005__ 20230306144439.0 000827118 006__ m\\\\\o\\d\\\\\\\\ 000827118 007__ cr\cn\nnnunnun 000827118 008__ 180326s2018\\\\nyu\\\\\o\\\\\001\0\eng\d 000827118 019__ $$a1031484907$$a1033650363 000827118 020__ $$a9781484232583$$q(electronic book) 000827118 020__ $$a1484232585$$q(electronic book) 000827118 020__ $$z9781484232576 000827118 0247_ $$a10.1007/978-1-4842-3258-3$$2doi 000827118 035__ $$aSP(OCoLC)on1029545766 000827118 035__ $$aSP(OCoLC)1029545766$$z(OCoLC)1031484907$$z(OCoLC)1033650363 000827118 037__ $$aCL0500000957$$bSafari Books Online 000827118 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dOCLCA$$dOCLCF$$dUMI$$dUPM 000827118 049__ $$aISEA 000827118 050_4 $$aQA76.9.A25 000827118 08204 $$a005.8$$223 000827118 1001_ $$aDonaldson, Scott E.,$$eauthor. 000827118 24510 $$aEnterprise cybersecurity study guide :$$bhow to build a successful cyberdefense program against advanced threats /$$cScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam. 000827118 264_1 $$aNew York, NY :$$bApress,$$c[2018] 000827118 300__ $$a1 online resource. 000827118 336__ $$atext$$btxt$$2rdacontent 000827118 337__ $$acomputer$$bc$$2rdamedia 000827118 338__ $$aonline resource$$bcr$$2rdacarrier 000827118 347__ $$atext file$$bPDF$$2rda 000827118 4901_ $$aThe expert's voice in cybersecurity 000827118 500__ $$aIncludes index. 000827118 5050_ $$aPart I: The Cybersecurity Challenge -- Chapter 1: Defining the Cybersecurity Challenge -- Chapter 2: Meeting the Cybersecurity Challenge -- Part II: A New Enterprise Cybersecurity Architecture -- Chapter 3: Enterprise Cybersecurity Architecture -- Chapter 4: Implementing Enterprise Cybersecurity -- Chapter 5: Operating Enterprise Cybersecurity -- Chapter 6: Enterprise Cybersecurity and the Cloud -- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building an Effective Defense -- Chapter 9: Responding to Incidents -- Chapter 10: Managing a Cybersecurity Crisis -- Part IV: Enterprise Cyber Defense Assessment -- Chapter 11: Assessing Enterprise Cybersecurity -- Chapter 12: Measuring a Cybersecurity Program -- Chapter 13: Mapping Against Cybersecurity Frameworks -- Part V: Enterprise Cybersecurity Program -- Chapter 14: Managing an Enterprise Cybersecurity Program -- Chapter 15: Looking to the Future -- Part VI: Appendices -- Appendix A: Sample Cybersecurity Policy -- Appendix B: Cybersecurity Operational Processes -- Appendix C: Object Measurement -- Appendix D: Cybersecurity Sample Assessment -- Appendix E: Cybersecurity Capability Value Scales. 000827118 506__ $$aAccess limited to authorized users. 000827118 588__ $$aOnline resource; title from PDF title page (viewed March 28, 2018). 000827118 650_0 $$aComputer security. 000827118 650_0 $$aComputer crimes$$xPrevention. 000827118 7001_ $$aSiegel, Stanley G.,$$eauthor. 000827118 7001_ $$aWilliams, Chris K.,$$eauthor. 000827118 7001_ $$aAslam, Abdul,$$eauthor. 000827118 77608 $$iPrint version: $$z9781484232576 000827118 830_0 $$aExpert's voice in cybersecurity. 000827118 852__ $$bebk 000827118 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-3258-3$$zOnline Access$$91397441.1 000827118 909CO $$ooai:library.usi.edu:827118$$pGLOBAL_SET 000827118 980__ $$aEBOOK 000827118 980__ $$aBIB 000827118 982__ $$aEbook 000827118 983__ $$aOnline 000827118 994__ $$a92$$bISE