Cyber security basics protect your organization by applying the fundamentals
This book covers concepts and controls. It is a good primer for those new to the field and a refresher for the more seasoned practitioner. It is for those who are tasked with creating, leading, supporting or improving an organization's cyber security program. The goal is to help clear some of t...
Saved in:
| Main Author: | Franke, Don (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
[Place of publication not identified]
[Don Franke]
[2016]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber warfare techniques, tactics and tools for security practitioners
by: Andrees, Jason, et al.
Published: (2014)
by: Andrees, Jason, et al.
Published: (2014)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Information security management handbook
Published: (2012)
Published: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Information protection playbook
Published: (2013)
Published: (2013)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012)
by: McCarthy, N.K
Published: (2012)
Information Security Management Handbook
Published: (2012)
Published: (2012)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Handbook of research on information security and assurance
Published: (2009)
Published: (2009)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Applied security visualization
by: Marty, Raffael 1976-
Published: (2009)
by: Marty, Raffael 1976-
Published: (2009)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Similar Items
-
Cyber warfare techniques, tactics and tools for security practitioners
by: Andrees, Jason, et al.
Published: (2014) -
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016) -
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009) -
Advances in enterprise information technology security
Published: (2007) -
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)


