Facing cyber threats head on protecting yourself and your business
Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers a new approach to defending against cyber attacks, one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can.
Saved in:
| Main Author: | Minick, Brian (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Lanham, Md.
Rowman & Littlefield Publishers
[2016]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Computer security handbook
Published: (2014)
Published: (2014)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Information protection playbook
Published: (2013)
Published: (2013)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Data science for cyber-security
Published: (2019)
Published: (2019)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Computing in the information age
by: SternlhNancy B.
by: SternlhNancy B.
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Digital rights management an introduction
Published: (2010)
Published: (2010)
IT auditing using controls to protect information assets
by: Davis, Chris (Christopher Michael)
Published: (2011)
by: Davis, Chris (Christopher Michael)
Published: (2011)
Cyber security of industrial control systems in the future internet environment
Published: (2020)
Published: (2020)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Psychological and behavioral examinations in cyber security
Published: (2018)
Published: (2018)
Similar Items
-
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016) -
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019) -
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016) -
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014) -
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)


