Amazon cover image
Image from Amazon.com

Managing cybersecurity risk : case studies and solutions / edited by Jonathan Reuvid.

Contributor(s): Material type: TextTextPublisher: London : Legend Business Books, 2018Edition: Edition 2Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781787198906
  • 1787198901
Subject(s): Genre/Form: Additional physical formats: Print version:: Managing cybersecurity risk.DDC classification:
  • 005.8 23
LOC classification:
  • HD30.38
Online resources:
Contents:
Cover -- Title -- Copyright -- Contents -- Foreword -- Preface -- List of Contributors -- Introduction -- Part One Cybersecurity in the Information Age -- 1.1 Building Business Resilience -- 1.2 Enterprise Vulnerablity Scanning -- 1.3 Cybercrime -- Translating the Tech from the Floor to the Boardroom -- 1.4 Cybersecurity: Moving from Awareness to Understanding -- 1.5 How Cyber Criminals Make Money -- 1.6 If SMEs are the Life Blood of the British Economy, We've Cut an Artery -- Part Two Addressing the Management Issues -- 2.1 Managing Cyber Risk -- The Role of the Board -- 2.2 Activating the Human Firewall -The Leap from Knowing to Doing -- 2.3 The Resilient Organisation -- Are We Searching for Our "Phlogiston"? -- 2.4 An Action Plan for Response and Damage Containment -- 2.5 Addressing the Skills Shortage in Cybersecurity -- Part Three General Data Protection Regulation -- 3.1 GDPR -- A View from the Frontline -- 3.2 GDPR -- Introducing the UK Regime -- 3.3 Using Scenario Workshops to Prepare for GDPR and Other Legislation -- 3.4 GDPR -- Comparative International Regimes -- 3.5 Intrusion Detection System Evaluation Guide -- Part Four Innovative Tools for Cyber Threat Response -- 4.1 Identifying Affordable and Cost-effective Solutions -- 4.2 Detecting Ransomware with Unified Security -- 4.3 Petya Ransomwware Rapid Response Guide -- 4.4 The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World -- Part Five Cautionary Tales from the Frontline -- 5.1 The Power of Storytelling -- 5.2 How to Avoid That 'I Told You So' Moment -- 5.3 A Cuckoo in the Nest? -- 5.4 The Trouble with Contractors -- 5.5 Hacked into a Parallel Universe -- Contributors' Contacts.
Summary: This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Vendor-supplied metadata.

This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.

Cover -- Title -- Copyright -- Contents -- Foreword -- Preface -- List of Contributors -- Introduction -- Part One Cybersecurity in the Information Age -- 1.1 Building Business Resilience -- 1.2 Enterprise Vulnerablity Scanning -- 1.3 Cybercrime -- Translating the Tech from the Floor to the Boardroom -- 1.4 Cybersecurity: Moving from Awareness to Understanding -- 1.5 How Cyber Criminals Make Money -- 1.6 If SMEs are the Life Blood of the British Economy, We've Cut an Artery -- Part Two Addressing the Management Issues -- 2.1 Managing Cyber Risk -- The Role of the Board -- 2.2 Activating the Human Firewall -The Leap from Knowing to Doing -- 2.3 The Resilient Organisation -- Are We Searching for Our "Phlogiston"? -- 2.4 An Action Plan for Response and Damage Containment -- 2.5 Addressing the Skills Shortage in Cybersecurity -- Part Three General Data Protection Regulation -- 3.1 GDPR -- A View from the Frontline -- 3.2 GDPR -- Introducing the UK Regime -- 3.3 Using Scenario Workshops to Prepare for GDPR and Other Legislation -- 3.4 GDPR -- Comparative International Regimes -- 3.5 Intrusion Detection System Evaluation Guide -- Part Four Innovative Tools for Cyber Threat Response -- 4.1 Identifying Affordable and Cost-effective Solutions -- 4.2 Detecting Ransomware with Unified Security -- 4.3 Petya Ransomwware Rapid Response Guide -- 4.4 The Incident Response Toolkit: Putting the OODA Loop to Work in the Real World -- Part Five Cautionary Tales from the Frontline -- 5.1 The Power of Storytelling -- 5.2 How to Avoid That 'I Told You So' Moment -- 5.3 A Cuckoo in the Nest? -- 5.4 The Trouble with Contractors -- 5.5 Hacked into a Parallel Universe -- Contributors' Contacts.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library