Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
This book is for security professionals and decision makers tasked with evaluating and selecting cybersecurity solutions to protect their organization from evolving threats. While a foundational understanding of cybersecurity is beneficial, it’s not a prerequisite.
Saved in:
| Main Author: | |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
United Kingdoms :
Packt Publishing Ltd.,
2024
©2024 |
| Edition: | 1st edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.A25 |
MARC
| LEADER | 00000naa a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 106378 | ||
| 003 | MY-KlNDU | ||
| 005 | 20250808110249.0 | ||
| 007 | ta | ||
| 008 | 250808s20242024-uka|||| |||| 001 0 eng d | ||
| 020 | |a 9781803230054 | ||
| 040 | |a MY-KlNDU |b eng |c MY-KlNDU |e rda | ||
| 050 | 0 | 0 | |a QA 76.9.A25 |
| 090 | |a QA 76.9.A25 |b A85 2024 | ||
| 100 | 1 | |a Aslaner, Milad |e author | |
| 245 | 1 | 0 | |a Cybersecurity Strategies and Best Practices : |b A comprehensive guide to mastering enterprise cyber defense tactics and techniques / |c Milad Aslaner |
| 250 | |a 1st edition | ||
| 250 | |a First edition | ||
| 264 | 1 | |a United Kingdoms : |b Packt Publishing Ltd., |c 2024 | |
| 264 | 1 | |c ©2024 | |
| 300 | |a xvii, 233 pages : |b illustrations ; |c 30 cm. | ||
| 336 | |a text \2 rdacontent | ||
| 337 | |a unmediated \2 rdamedia | ||
| 338 | |a volume \2 rdacarrier | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a 1.Profiling Cyber Adversaries and Their Tactics -- 2.Identifying and Assessing Organizational Weaknesses -- 3.Staying Ahead: Monitoring Emerging Threats and Trends -- 4.Assessing Your Organization's Security Posture -- 5.Developing a Comprehensive Modern Cybersecurity Strategy -- 6.Aligning Security Measures with Business Objectives -- 7.Demystifying Technology and Vendor Claims -- 8.Leveraging Existing Tools for Enhanced Security -- 9.Selecting and Implementing the Right Cybersecurity Solutions -- 10.Bridging the Gap between Technical and Non-Technical Stakeholders -- 11.Building a Cybersecurity-Aware Organizational Culture -- 12.Collaborating with Industry Partners and Sharing Threat Intelligence | |
| 520 | |a This book is for security professionals and decision makers tasked with evaluating and selecting cybersecurity solutions to protect their organization from evolving threats. While a foundational understanding of cybersecurity is beneficial, it’s not a prerequisite. | ||
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer crimes | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 942 | |c 1 |2 lcc | ||
| 999 | |c 106378 |d 106378 | ||


