Black week: Nyt 3 kk -50%

Astu tarinoiden maailmaan

  • Pohjoismaiden suosituin ääni- ja e-kirjapalvelu
  • Uppoudu suureen valikoimaan äänikirjoja ja e-kirjoja
  • Storytel Original -sisältöjä yksinoikeudella
  • Ei sitoutumisaikaa
Lunasta tarjous
NO - Details page - Device banner - 894x1036
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 Arviota

3.5

Kesto
3T 29M
Kielet
Englanti
Formaatti
Kategoria

Tietokirjallisuus

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (Äänikirja): 9781664914308

Julkaisupäivä

Äänikirja: 24. syyskuuta 2020

Saattaisit pitää myös näistä

  1. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  2. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  3. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  4. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  5. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  6. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  7. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  8. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  9. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  10. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  11. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  12. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  13. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  14. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  15. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  16. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  17. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  18. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  19. Spatial Computing
    Spatial Computing Pamela Vold
  20. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  21. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
    Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  22. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  23. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  24. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  25. How to Measure Anything in Cybersecurity Risk, 2nd Edition
    How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
  26. 3D Printing
    3D Printing John M. Jordan
  27. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  28. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  29. Haptics
    Haptics Lynette Jones
  30. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  31. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
    Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  32. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  33. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  34. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  35. Quantum Computing For Dummies
    Quantum Computing For Dummies whurley
  36. Disrupting Sacred Cows
    Disrupting Sacred Cows Garrett Gunderson
  37. Behavioural Economics: Psychology, neuroscience, and the human side of economics
    Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
  38. Mastering Research Papers: A Guide for PhD Students
    Mastering Research Papers: A Guide for PhD Students Arvind Chopra
  39. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
    Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
  40. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  41. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  42. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
    The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
  43. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  44. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  45. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
    Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
  46. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  47. CISSP All-in-One Exam Guide, Ninth Edition
    CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
  48. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
    Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
  49. Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets
    Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets Donald MacKenzie
  50. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  51. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey
  52. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  53. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  54. How Big-Tech Barons Smash Innovation—and How to Strike Back
    How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
  55. Fake Photos
    Fake Photos Hany Farid
  56. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  57. The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime
    The Space Economy: Capitalize on the Greatest Business Opportunity of Our Lifetime Chad Anderson
  58. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  59. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
    Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
  60. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
    ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
  61. Anatomy of a Ponzi: Scams Past and Present
    Anatomy of a Ponzi: Scams Past and Present Colleen Cross
  62. Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know
    Understandable Economics: Because Understanding Our Economy Is Easier Than You Think and More Important Than You Know Howard Yaruss
  63. Machine Learning
    Machine Learning Introbooks Team
  64. Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments
    Diplomacy Conversations: How to Win at Diplomacy, Or Strategy for Face-to-Face, Online, and Tournaments Erik van Mechelen
  65. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  66. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  67. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  68. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  69. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
    Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
  70. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  71. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
    Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  72. Business Consulting Methods
    Business Consulting Methods IntroBooks Team
  73. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  74. Project Myopia: Why Projects Damage Software #NoProjects
    Project Myopia: Why Projects Damage Software #NoProjects Allan Kelly

Valitse tilausmalli

  • Yli miljoona tarinaa

  • Suosituksia juuri sinulle

  • Uusia Storytel Originals + eksklusiivisia sisältöjä kuukausittain

  • Turvallinen Kids Mode

  • Ei sitoutumisaikaa

Tarjous on voimassa 30.11.2025 asti

Standard

Sinulle joka kuuntelet säännöllisesti.

16.99 € /kuukausi
  • 1 käyttäjätili

  • 50 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous
Suosituin
Tarjous on voimassa 30.11.2025 asti

Premium

Sinulle joka kuuntelet ja luet usein.

19.99 € /kuukausi
  • 1 käyttäjätili

  • 100 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous

Flex

Sinulle joka kuuntelet vähemmän.

9.99 € /kuukausi
  • 1 käyttäjätili

  • 20 tuntia/kuukausi

  • Säästä käyttämättömät tunnit, max 20h

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Unlimited

Sinulle joka haluat rajattomasti tarinoita.

29.99 € /kuukausi
  • 1 käyttäjätili

  • Kuuntele ja lue rajattomasti

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Family

Kun haluat jakaa tarinoita perheen kanssa.

Alkaen 26.99 €/kuukausi
  • 2-6 tiliä

  • 100 tuntia/kk jokaiselle käyttäjälle

  • Ei sitoutumisaikaa

2 käyttäjätiliä

26.99 € /kuukausi
Aloita ilmainen kokeilu