Saved in:
Main Author: | |
---|---|
Corporate Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, New Jersey
John Wiley & Sons
[2021]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781469082707/?ar |
Summary: | "The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"-- |
Item Description: | Electronic audio file |
Physical Description: | 1 online resource (1 sound file) |
ISBN: | 1469082705 9781469082707 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-069801371 | ||
003 | DE-627-1 | ||
005 | 20240228121334.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211110s2021 xx |||||o 00| ||eng c | ||
020 | |a 1469082705 |9 1-4690-8270-5 | ||
020 | |a 9781469082707 |9 978-1-4690-8270-7 | ||
035 | |a (DE-627-1)069801371 | ||
035 | |a (DE-599)KEP069801371 | ||
035 | |a (ORHE)9781469082707 | ||
035 | |a (DE-627-1)069801371 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.15/5 |2 23 | |
100 | 1 | |a Moore, Richard O. |d 1971- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber intelligence-driven risk |b how to build and use cyber intelligence for business risk decisions |c by Richard O. Moore III, MSIA, CISSP, CISM |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons |c [2021] | |
300 | |a 1 online resource (1 sound file) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Electronic audio file | ||
520 | |a "The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"-- | ||
650 | 0 | |a Business enterprises |x Security measures | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Data protection | |
650 | 0 | |a Risk management | |
650 | 2 | |a Risk Management | |
650 | 4 | |a Entreprises ; Sécurité ; Mesures | |
650 | 4 | |a Surveillance des menaces informatiques | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a Business enterprises ; Security measures | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Data protection | |
650 | 4 | |a Risk management | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a OverDrive, Inc., |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781119676911 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119676911 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781469082707/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-069801371 |
---|---|
_version_ | 1833357037165084672 |
adam_text | |
any_adam_object | |
author | Moore, Richard O. 1971- |
author_corporate | O'Reilly for Higher Education (Firm) OverDrive, Inc |
author_corporate_role | ctb ctb |
author_facet | Moore, Richard O. 1971- O'Reilly for Higher Education (Firm) OverDrive, Inc |
author_role | aut |
author_sort | Moore, Richard O. 1971- |
author_variant | r o m ro rom |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)069801371 (DE-599)KEP069801371 (ORHE)9781469082707 |
dewey-full | 658.15/5 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.15/5 |
dewey-search | 658.15/5 |
dewey-sort | 3658.15 15 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02996cam a22005652c 4500</leader><controlfield tag="001">ZDB-30-ORH-069801371</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121334.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211110s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1469082705</subfield><subfield code="9">1-4690-8270-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781469082707</subfield><subfield code="9">978-1-4690-8270-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069801371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP069801371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781469082707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069801371</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15/5</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Moore, Richard O.</subfield><subfield code="d">1971-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber intelligence-driven risk</subfield><subfield code="b">how to build and use cyber intelligence for business risk decisions</subfield><subfield code="c">by Richard O. Moore III, MSIA, CISSP, CISM</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 sound file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Electronic audio file</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entreprises ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Surveillance des menaces informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">OverDrive, Inc.,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119676911</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119676911</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781469082707/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-069801371 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:19Z |
institution | BVB |
isbn | 1469082705 9781469082707 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 sound file) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Moore, Richard O. 1971- VerfasserIn aut Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions by Richard O. Moore III, MSIA, CISSP, CISM Hoboken, New Jersey John Wiley & Sons [2021] 1 online resource (1 sound file) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Electronic audio file "The objective of the book will be approached from building a functional cyber intelligence driven risk program and explaining in granular detail how each function and capability can be properly leveraged to make informed business decisions in the era of increased emergent cyber threats and attacks. Readers will be able to: Build, buy, or outsource a functioning cyber intelligence driven risk program Understand the functional capabilities needed to have an effective program Know how to turn cyber intelligence into business decisions Effectively use cyber intelligence to support Enterprise Risk Management programs Reduce the impact of cyber events through intelligence for many business operations leveraging new technologies. Discern how can an effective cyber intelligence driven risk program influence mergers and acquisitions and the benefits of predictive cyber intelligence analytics. Reduce loss from cyber events for the organization"-- Business enterprises Security measures Cyber intelligence (Computer security) Data protection Risk management Risk Management Entreprises ; Sécurité ; Mesures Surveillance des menaces informatiques Protection de l'information (Informatique) Gestion du risque risk management Business enterprises ; Security measures O'Reilly for Higher Education (Firm), MitwirkendeR ctb OverDrive, Inc., MitwirkendeR ctb 9781119676911 Erscheint auch als Druck-Ausgabe 9781119676911 |
spellingShingle | Moore, Richard O. 1971- Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions Business enterprises Security measures Cyber intelligence (Computer security) Data protection Risk management Risk Management Entreprises ; Sécurité ; Mesures Surveillance des menaces informatiques Protection de l'information (Informatique) Gestion du risque risk management Business enterprises ; Security measures |
title | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions |
title_auth | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions |
title_exact_search | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions |
title_full | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions by Richard O. Moore III, MSIA, CISSP, CISM |
title_fullStr | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions by Richard O. Moore III, MSIA, CISSP, CISM |
title_full_unstemmed | Cyber intelligence-driven risk how to build and use cyber intelligence for business risk decisions by Richard O. Moore III, MSIA, CISSP, CISM |
title_short | Cyber intelligence-driven risk |
title_sort | cyber intelligence driven risk how to build and use cyber intelligence for business risk decisions |
title_sub | how to build and use cyber intelligence for business risk decisions |
topic | Business enterprises Security measures Cyber intelligence (Computer security) Data protection Risk management Risk Management Entreprises ; Sécurité ; Mesures Surveillance des menaces informatiques Protection de l'information (Informatique) Gestion du risque risk management Business enterprises ; Security measures |
topic_facet | Business enterprises Security measures Cyber intelligence (Computer security) Data protection Risk management Risk Management Entreprises ; Sécurité ; Mesures Surveillance des menaces informatiques Protection de l'information (Informatique) Gestion du risque risk management Business enterprises ; Security measures |
work_keys_str_mv | AT moorerichardo cyberintelligencedrivenriskhowtobuildandusecyberintelligenceforbusinessriskdecisions AT oreillyforhighereducationfirm cyberintelligencedrivenriskhowtobuildandusecyberintelligenceforbusinessriskdecisions AT overdriveinc cyberintelligencedrivenriskhowtobuildandusecyberintelligenceforbusinessriskdecisions |