Cyber security auditing, assurance, and awareness through CSAM and CATRAM emerging research and opportunities

"This book evaluates the implementation and validation of the Cyber Security Audit Model (CSAM), along with the delivery and inception of the Cybersecurity Awareness TRAining Model (CATRAM) to train personnel on cyber security awareness matter"--

Bibliographic Details
Main Author: Sabillon, Regner, 1967-
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 02586cam a22004938i 4500
001 koha001013426
003 OCoLC
005 20250222070000.0
006 m d | |
007 cr |||||||||||
008 200227s2021 pau ob 001 0 eng
010 |a  2020009696 
035 |a koha001013426 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d IGIGL  |d N$T  |d UKAHL 
019 |a 1191068387 
020 |a 9781799841647  |q (electronic bk.) 
020 |a 1799841642  |q (electronic bk.) 
020 |a 9781799841630  |q (ebook) 
020 |a 1799841634 
020 |z 9781799841623  |q (hardcover) 
020 |z 9781799856092  |q (paperback) 
042 |a pcc 
050 0 0 |a HF5548.37 
082 0 0 |a 658.4/78  |2 23 
049 |a MAIN 
100 1 |a Sabillon, Regner,  |d 1967-  |9 911633 
245 1 0 |a Cyber security auditing, assurance, and awareness through CSAM and CATRAM  |b emerging research and opportunities  |c by Regner Sabillon. 
263 |a 2007 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2021] 
300 |a 1 online resource 
504 |a Includes bibliographical references and index. 
520 |a "This book evaluates the implementation and validation of the Cyber Security Audit Model (CSAM), along with the delivery and inception of the Cybersecurity Awareness TRAining Model (CATRAM) to train personnel on cyber security awareness matter"--  |c Provided by publisher. 
588 |a Description based on print version record and CIP data provided by publisher; resource not viewed. 
505 0 |a Chapter 1. Cybercrime and cybercriminals -- Chapter 2. Cybersecurity incident response and management -- Chapter 3. Digital forensics of cybercrimes and the use of cyber forensics tools to obtain digital evidence -- Chapter 4. Electronic discovery (e-discovery) -- Chapter 5. National cybersecurity strategies -- Chapter 6. Cyber warfare and the challenges that exist in the cyber domain -- Chapter 7. Audits in cybersecurity -- Chapter 8. The cybersecurity audit model (CSAM) -- Chapter 9. The cybersecurity awareness training model (CATRAM). 
653 0 |a Computer security  |x Management. 
653 0 |a Data protection  |x Management. 
653 7 |a Computer security  |x Management.  |2 fast 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2529653.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013426 
910 |a EBSCO eBooks 
999 |c 1013426  |d 1013426 
039