Cybersecurity for Business : Organization-Wide Strategies to Ensure Cyber Risk is Not an IT Issue
| Main Author: | Clinton, Larry (Author) |
|---|---|
| Format: | Book |
| Published: |
United States :
Kogan Page Limited
[2022]
|
| Subjects: |
Similar Items
Security Awareness for dummies
by: Winkler, Ira
Published: (2022)
by: Winkler, Ira
Published: (2022)
Cybersecurity program development for business : the essential planning guide
by: Moschovitis, Chris
Published: (2018)
by: Moschovitis, Chris
Published: (2018)
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022)
by: Steinberg, Joseph
Published: (2022)
Cybersecurity and Third-Party Risk : Third Party Threat Hunting
by: Rasner, Gregory
Published: (2021)
by: Rasner, Gregory
Published: (2021)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)
by: Kostopoulos, George K.
Published: (2013)
The personal cybersecurity bible
by: Ledford, Jerri L.
Published: (2006)
by: Ledford, Jerri L.
Published: (2006)
New solutions for cybersecurity
Published: (2017)
Published: (2017)
Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
by: Messier, Ric
Published: (2020)
by: Messier, Ric
Published: (2020)
INSIDE JOBs : WHY INSIDER RISK IS THE BIGGEST CYBER THREAT YOU CAN'T IGNORE
by: Payne, Joe, et al.
Published: (2020)
by: Payne, Joe, et al.
Published: (2020)
The cybersecurity playbook : how every leader and employee can contribute to a culture of security
by: Cerra, Allison
by: Cerra, Allison
Cybersecurity Lessons from CoVID-19
by: Slade, Robert
Published: (2021)
by: Slade, Robert
Published: (2021)
CYBER MAYDAY AND THE DAY AFTER : A LEADER'S GUIDE TO PREPARING, MANAGING, AND RECOVERING FROM INEVITABLE BUSINESS DISRUPTIONS
by: Lohrmann, Dan, et al.
Published: (2022)
by: Lohrmann, Dan, et al.
Published: (2022)
Managing cybersecurity resources : a cost-benefit analysis
by: Gordon, Lawrence A.
Published: (2006)
by: Gordon, Lawrence A.
Published: (2006)
TRIBE OF HACKERS BLUE TEAM : TRIBALKNOWLEDGE FROM THE BEST IN DEFENSIVE CYBERSECURITY
by: Carey, Marcus J., et al.
Published: (2020)
by: Carey, Marcus J., et al.
Published: (2020)
TRIBE OF HACKERS SECURITY LEADERS : TRIBAL KNOWLEDGE FROM THE BEST IN CYBERSECURITY LEADERSHIP
by: Carey, Marcus J., et al.
Published: (2020)
by: Carey, Marcus J., et al.
Published: (2020)
Digital defense : what you should know about protecting your company's assets
by: Parenty, Thomas J.
Published: (2003)
by: Parenty, Thomas J.
Published: (2003)
PROJECT ZERO TRUST : A Story about a Strategy for Aligning Security and the Business
by: Finney, George
Published: (2023)
by: Finney, George
Published: (2023)
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)
by: Held, Jonathan S.
Published: (2001)
Cyber Intelligence-Driven Risk : How to Build and Use Cyber Intelligence for Business Risk Decisions
by: Moore, Richard O. III
Published: (2021)
by: Moore, Richard O. III
Published: (2021)
Cyber security culture : counteracting cyber threats through organizational learning and training
by: Trim, Peter R.J
Published: (2013)
by: Trim, Peter R.J
Published: (2013)
E-policy : how to develop computer,E-mail and enternet guidelines to protect your company and its assets
by: Overly, Michael R.
Published: (1999)
by: Overly, Michael R.
Published: (1999)
Computer security
by: Gollmann, Dieter
Published: (2006)
by: Gollmann, Dieter
Published: (2006)
The Underground guide to computer security : slightly askew advice on protecting your PC and what's on it
by: Alexander, Michael
Published: (1996)
by: Alexander, Michael
Published: (1996)
Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
by: Davis, Michael
Published: (2010)
by: Davis, Michael
Published: (2010)
Security intelligence : a practitioner's guide to solving enterprise security challenger
by: Qing, Li
Published: (2015)
by: Qing, Li
Published: (2015)
Is it safe? : protecting your computer,your business and yourself online
by: Miller, Michael
Published: (2008)
by: Miller, Michael
Published: (2008)
Cybersecurity : politics, governance and conflict in cyberspace
by: Van Puyvelde, Damien
Published: (2018)
by: Van Puyvelde, Damien
Published: (2018)
Strategi Wifi anti-hacking
by: Arista Prasetyo Adi
by: Arista Prasetyo Adi
IT governance
by: Calder, Alan
Published: (2012)
by: Calder, Alan
Published: (2012)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
EXECUTIVE'S GUIDE TO CYBER RISK : SECURING THE FUTURE TODAY
by: Moyo, Siedfried
Published: (2022)
by: Moyo, Siedfried
Published: (2022)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
E-commerce security : Weak links,best defenses
by: Ghosh, Anup K
Published: (1998)
by: Ghosh, Anup K
Published: (1998)
Similar Items
-
Security Awareness for dummies
by: Winkler, Ira
Published: (2022) -
Cybersecurity program development for business : the essential planning guide
by: Moschovitis, Chris
Published: (2018) -
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022) -
Cybersecurity and Third-Party Risk : Third Party Threat Hunting
by: Rasner, Gregory
Published: (2021) -
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)