Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats /

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. I...

Full description

Bibliographic Details
Published in:Springer eBooks
Main Authors: Donaldson, Scott E. (Author), Siegel, Stanley G. (Author), Williams, Chris K. (Author), Aslam, Abdul (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2015.
Subjects:
Online Access:http://dx.doi.org/10.1007/978-1-4302-6083-7
Перейти в каталог НБ ТГУ
LEADER 03673nam a22004575i 4500
001 vtls000556372
003 RU-ToGU
005 20210922084848.0
007 cr nn 008mamaa
008 170212s2015 xxu| s |||| 0|eng d
020 |a 9781430260837  |9 978-1-4302-6083-7 
024 7 |a 10.1007/978-1-4302-6083-7  |2 doi 
035 |a to000556372 
039 9 |y 201702122100  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 |a Donaldson, Scott E.  |e author.  |9 460226 
245 1 0 |a Enterprise Cybersecurity  |h electronic resource  |b How to Build a Successful Cyberdefense Program Against Advanced Threats /  |c by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam. 
260 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2015.  |9 712623 
300 |a XLII, 536 p. 223 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Data encryption (Computer science).  |9 566260 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Data Encryption.  |9 566261 
700 1 |a Siegel, Stanley G.  |e author.  |9 460227 
700 1 |a Williams, Chris K.  |e author.  |9 460228 
700 1 |a Aslam, Abdul.  |e author.  |9 460229 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4302-6083-7 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=410541 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059) 
999 |c 410541  |d 410541