Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Pearson
2024
|
Ausgabe: | Fourth edition. |
Schriftenreihe: | Pearson IT cybersecurity curriculum
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780138073992/?ar |
Zusammenfassung: | Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functionsfrom HR to physical securityto enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (768 pages) illustrations |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-106393677 | ||
003 | DE-627-1 | ||
005 | 20240819122018.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240819s2024 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)106393677 | ||
035 | |a (DE-599)KEP106393677 | ||
035 | |a (ORHE)9780138073992 | ||
035 | |a (DE-627-1)106393677 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240715 | |
100 | 1 | |a Santos, Omar |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Developing cybersecurity programs and policies in an AI-driven world |c Omar Santos |
250 | |a Fourth edition. | ||
264 | 1 | |a Hoboken, New Jersey |b Pearson |c 2024 | |
300 | |a 1 Online-Ressource (768 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Pearson IT cybersecurity curriculum | |
500 | |a Includes bibliographical references and index | ||
520 | |a Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functionsfrom HR to physical securityto enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Artificial intelligence | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Information technology |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Intelligence artificielle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a artificial intelligence | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780138073992/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-106393677 |
---|---|
_version_ | 1835903246057603072 |
adam_text | |
any_adam_object | |
author | Santos, Omar |
author_facet | Santos, Omar |
author_role | aut |
author_sort | Santos, Omar |
author_variant | o s os |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)106393677 (DE-599)KEP106393677 (ORHE)9780138073992 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02931nam a22004452c 4500</leader><controlfield tag="001">ZDB-30-ORH-106393677</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240819122018.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240819s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106393677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP106393677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780138073992</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106393677</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240715</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Santos, Omar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Developing cybersecurity programs and policies in an AI-driven world</subfield><subfield code="c">Omar Santos</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Pearson</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (768 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Pearson IT cybersecurity curriculum</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functionsfrom HR to physical securityto enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial intelligence</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780138073992/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-106393677 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:16:13Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (768 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Pearson |
record_format | marc |
series2 | Pearson IT cybersecurity curriculum |
spelling | Santos, Omar VerfasserIn aut Developing cybersecurity programs and policies in an AI-driven world Omar Santos Fourth edition. Hoboken, New Jersey Pearson 2024 1 Online-Ressource (768 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Pearson IT cybersecurity curriculum Includes bibliographical references and index Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functionsfrom HR to physical securityto enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework. Computer security Artificial intelligence Computer networks Security measures Information technology Security measures Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures artificial intelligence |
spellingShingle | Santos, Omar Developing cybersecurity programs and policies in an AI-driven world Computer security Artificial intelligence Computer networks Security measures Information technology Security measures Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures artificial intelligence |
title | Developing cybersecurity programs and policies in an AI-driven world |
title_auth | Developing cybersecurity programs and policies in an AI-driven world |
title_exact_search | Developing cybersecurity programs and policies in an AI-driven world |
title_full | Developing cybersecurity programs and policies in an AI-driven world Omar Santos |
title_fullStr | Developing cybersecurity programs and policies in an AI-driven world Omar Santos |
title_full_unstemmed | Developing cybersecurity programs and policies in an AI-driven world Omar Santos |
title_short | Developing cybersecurity programs and policies in an AI-driven world |
title_sort | developing cybersecurity programs and policies in an ai driven world |
topic | Computer security Artificial intelligence Computer networks Security measures Information technology Security measures Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures artificial intelligence |
topic_facet | Computer security Artificial intelligence Computer networks Security measures Information technology Security measures Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures artificial intelligence |
work_keys_str_mv | AT santosomar developingcybersecurityprogramsandpoliciesinanaidrivenworld |