Enterprise cybersecurity study guide: how to build a successful cyberdefense program against advanced threats
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
New York, NY
Apress
[2018]
|
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm |
Umfang: | xlv, 709 Seiten Illustrationen |
ISBN: | 9781484232576 1484232577 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045089996 | ||
003 | DE-604 | ||
005 | 20180829 | ||
007 | t| | ||
008 | 180717s2018 xxua||| |||| 00||| eng d | ||
016 | 7 | |a 1141069652 |2 DE-101 | |
020 | |a 9781484232576 |c pbk. |9 978-1-4842-3257-6 | ||
020 | |a 1484232577 |9 1-4842-3257-7 | ||
035 | |a (OCoLC)1048739970 | ||
035 | |a (DE-599)DNB1141069652 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-11 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Donaldson, Scott E. |e Verfasser |0 (DE-588)1164388738 |4 aut | |
245 | 1 | 0 | |a Enterprise cybersecurity study guide |b how to build a successful cyberdefense program against advanced threats |c Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
264 | 1 | |a New York, NY |b Apress |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xlv, 709 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Cybersecurity | ||
653 | |a Cyberdefense | ||
653 | |a Cybersecurity framework | ||
653 | |a Cybersecurity architecture | ||
653 | |a Cybersecurity functional areas | ||
653 | |a Cybersecurity capabilities | ||
653 | |a Cybersecurity operations | ||
653 | |a Cybersecurity controls | ||
653 | |a Enterprise security posture | ||
653 | |a Cybersecurity program | ||
653 | |a Cybersecurity program audits | ||
653 | |a Cybersecurity program assessments | ||
653 | |a Cybersecurity measurement | ||
653 | |a Cybersecurity responsibilities | ||
653 | |a Cybersecurity policy | ||
653 | |a Security | ||
653 | |a Infosec | ||
653 | |a Security | ||
653 | |a Data Encryption | ||
653 | |a Systems and Data Security | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Siegel, Stanley G. |e Verfasser |0 (DE-588)1164393596 |4 aut | |
700 | 1 | |a Williams, Chris K. |e Verfasser |0 (DE-588)1164393871 |4 aut | |
700 | 1 | |a Aslam, Abdul |e Verfasser |0 (DE-588)1164393952 |4 aut | |
710 | 2 | |a Apress L.P. |0 (DE-588)1065538766 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-3258-3 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030480796 |
Datensatz im Suchindex
_version_ | 1818984359117455361 |
---|---|
any_adam_object | |
author | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_GND | (DE-588)1164388738 (DE-588)1164393596 (DE-588)1164393871 (DE-588)1164393952 |
author_facet | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_role | aut aut aut aut |
author_sort | Donaldson, Scott E. |
author_variant | s e d se sed s g s sg sgs c k w ck ckw a a aa |
building | Verbundindex |
bvnumber | BV045089996 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1048739970 (DE-599)DNB1141069652 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02531nam a2200673 c 4500</leader><controlfield tag="001">BV045089996</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180829 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180717s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1141069652</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484232576</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-4842-3257-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484232577</subfield><subfield code="9">1-4842-3257-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1048739970</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1141069652</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164388738</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise cybersecurity study guide</subfield><subfield code="b">how to build a successful cyberdefense program against advanced threats</subfield><subfield code="c">Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xlv, 709 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberdefense</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity architecture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity functional areas</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity capabilities</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity operations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity controls</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Enterprise security posture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program audits</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity program assessments</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity measurement</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity responsibilities</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Infosec</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393596</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1164393952</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Apress L.P.</subfield><subfield code="0">(DE-588)1065538766</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-3258-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030480796</subfield></datafield></record></collection> |
id | DE-604.BV045089996 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:17:45Z |
institution | BVB |
institution_GND | (DE-588)1065538766 |
isbn | 9781484232576 1484232577 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030480796 |
oclc_num | 1048739970 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xlv, 709 Seiten Illustrationen |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Donaldson, Scott E. Verfasser (DE-588)1164388738 aut Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam New York, NY Apress [2018] © 2018 xlv, 709 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cybersecurity Cyberdefense Cybersecurity framework Cybersecurity architecture Cybersecurity functional areas Cybersecurity capabilities Cybersecurity operations Cybersecurity controls Enterprise security posture Cybersecurity program Cybersecurity program audits Cybersecurity program assessments Cybersecurity measurement Cybersecurity responsibilities Cybersecurity policy Security Infosec Data Encryption Systems and Data Security Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Siegel, Stanley G. Verfasser (DE-588)1164393596 aut Williams, Chris K. Verfasser (DE-588)1164393871 aut Aslam, Abdul Verfasser (DE-588)1164393952 aut Apress L.P. (DE-588)1065538766 pbl Erscheint auch als Online-Ausgabe 978-1-4842-3258-3 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm Inhaltstext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats |
title_auth | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats |
title_exact_search | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats |
title_full | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_fullStr | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_full_unstemmed | Enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_short | Enterprise cybersecurity study guide |
title_sort | enterprise cybersecurity study guide how to build a successful cyberdefense program against advanced threats |
title_sub | how to build a successful cyberdefense program against advanced threats |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=da3d6ab5c74a45b7a6ac01dc66a9535a&prov=M&dok_var=1&dok_ext=htm |
work_keys_str_mv | AT donaldsonscotte enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT siegelstanleyg enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT williamschrisk enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT aslamabdul enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT apresslp enterprisecybersecuritystudyguidehowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats |