Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. I...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
[Berkeley, CA]
Apress
[2015]
|
Series: | The expert's voice in cybersecurity
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781430260837/?ar |
Summary: | Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. |
Item Description: | Includes bibliographical references and index. - Online resource; title from PDF title page (EBSCO, viewed May 28, 2015) |
Physical Description: | 1 Online-Ressource Illustrationen |
ISBN: | 9781430260837 1430260831 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04757576X | ||
003 | DE-627-1 | ||
005 | 20240228115849.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781430260837 |c electronic bk. |9 978-1-4302-6083-7 | ||
020 | |a 1430260831 |c electronic bk. |9 1-4302-6083-1 | ||
035 | |a (DE-627-1)04757576X | ||
035 | |a (DE-599)KEP04757576X | ||
035 | |a (ORHE)9781430260837 | ||
035 | |a (DE-627-1)04757576X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a URY |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Donaldson, Scott E. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Enterprise cybersecurity |b how to build a successful cyberdefense program against advanced threats |c Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
264 | 1 | |a [Berkeley, CA] |b Apress |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 Online-Ressource |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The expert's voice in cybersecurity | |
500 | |a Includes bibliographical references and index. - Online resource; title from PDF title page (EBSCO, viewed May 28, 2015) | ||
520 | |a Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. | ||
546 | |a English. | ||
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a computerwetenschappen | |
650 | 0 | |a computer sciences | |
650 | 0 | |a gegevensbeheer | |
650 | 0 | |a data management | |
650 | 0 | |a Information and Communication Technology (General) | |
650 | 0 | |a Informatie- en communicatietechnologie (algemeen) | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Informatique | |
650 | 4 | |a computer science | |
650 | 4 | |a data processing | |
650 | 4 | |a Data encryption | |
650 | 4 | |a Computer security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet ; Security measures | |
650 | 4 | |a dissertations | |
650 | 4 | |a Academic theses | |
650 | 4 | |a Academic theses | |
650 | 4 | |a Thèses et écrits académiques | |
700 | 1 | |a Siegel, Stanley G. |e VerfasserIn |4 aut | |
700 | 1 | |a Williams, Chris K. |e VerfasserIn |4 aut | |
700 | 1 | |a Aslam, Abdul |e VerfasserIn |4 aut | |
776 | 1 | |z 9781430260820 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781430260820 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781430260837/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-04757576X |
---|---|
_version_ | 1831287094249521152 |
adam_text | |
any_adam_object | |
author | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_facet | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul |
author_role | aut aut aut aut |
author_sort | Donaldson, Scott E. |
author_variant | s e d se sed s g s sg sgs c k w ck ckw a a aa |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04757576X (DE-599)KEP04757576X (ORHE)9781430260837 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04458cam a22007332c 4500</leader><controlfield tag="001">ZDB-30-ORH-04757576X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115849.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430260837</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4302-6083-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430260831</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4302-6083-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04757576X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04757576X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781430260837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04757576X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">URY</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott E.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise cybersecurity</subfield><subfield code="b">how to build a successful cyberdefense program against advanced threats</subfield><subfield code="c">Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, CA]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in cybersecurity</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from PDF title page (EBSCO, viewed May 28, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">computerwetenschappen</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">computer sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">gegevensbeheer</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">data management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information and Communication Technology (General)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Informatie- en communicatietechnologie (algemeen)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">dissertations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Academic theses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Academic theses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Thèses et écrits académiques</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris K.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aslam, Abdul</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781430260820</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781430260820</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781430260837/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04757576X |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:24:27Z |
institution | BVB |
isbn | 9781430260837 1430260831 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource Illustrationen |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Apress |
record_format | marc |
series2 | The expert's voice in cybersecurity |
spelling | Donaldson, Scott E. VerfasserIn aut Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam [Berkeley, CA] Apress [2015] ©2015 1 Online-Ressource Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The expert's voice in cybersecurity Includes bibliographical references and index. - Online resource; title from PDF title page (EBSCO, viewed May 28, 2015) Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise?s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization?s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. English. Internet Security measures Computer security computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Internet ; Sécurité ; Mesures Sécurité informatique Informatique computer science data processing Data encryption COMPUTERS ; Security ; General Internet ; Security measures dissertations Academic theses Thèses et écrits académiques Siegel, Stanley G. VerfasserIn aut Williams, Chris K. VerfasserIn aut Aslam, Abdul VerfasserIn aut 9781430260820 Erscheint auch als Druck-Ausgabe 9781430260820 |
spellingShingle | Donaldson, Scott E. Siegel, Stanley G. Williams, Chris K. Aslam, Abdul Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats Internet Security measures Computer security computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Internet ; Sécurité ; Mesures Sécurité informatique Informatique computer science data processing Data encryption COMPUTERS ; Security ; General Internet ; Security measures dissertations Academic theses Thèses et écrits académiques |
title | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats |
title_auth | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats |
title_exact_search | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats |
title_full | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_fullStr | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_full_unstemmed | Enterprise cybersecurity how to build a successful cyberdefense program against advanced threats Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
title_short | Enterprise cybersecurity |
title_sort | enterprise cybersecurity how to build a successful cyberdefense program against advanced threats |
title_sub | how to build a successful cyberdefense program against advanced threats |
topic | Internet Security measures Computer security computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Internet ; Sécurité ; Mesures Sécurité informatique Informatique computer science data processing Data encryption COMPUTERS ; Security ; General Internet ; Security measures dissertations Academic theses Thèses et écrits académiques |
topic_facet | Internet Security measures Computer security computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Internet ; Sécurité ; Mesures Sécurité informatique Informatique computer science data processing Data encryption COMPUTERS ; Security ; General Internet ; Security measures dissertations Academic theses Thèses et écrits académiques |
work_keys_str_mv | AT donaldsonscotte enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT siegelstanleyg enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT williamschrisk enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats AT aslamabdul enterprisecybersecurityhowtobuildasuccessfulcyberdefenseprogramagainstadvancedthreats |