ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

Cybersecurity Fundamentals: How to Establish Effective Security Management Functions

2 คะแนน

3.5

ระยะเวลา
3 ชม. 29 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

Data breaches and network intrusions are constantly in front page headline news. No matter how the data was lost or the network invaded, tracing the root cause of IT security problems usually leads back to ineffective management of security programs. In this book, you'll gain solid foundational knowledge and skills you can use to effectively manage security in your organization.

You will learn:

• Objectives of Security Management • How to support Security Goals • Security Management Principles • Defense in Depth • How to apply Security Controls • Security Control Functions • How to establish Organizational Governance • Security Strategy & Governance Scenario • Information Security Relationships • Business, Compliance, and Security • Management Roles and Responsibilities • Security Roles and Responsibilities • How to create a Security Management Program • Security Management Program Structure • How to decipher the Risk Management Program • Risk Strategy Fundamentals • Risk Management Scenario • Risk within the Organization • How to conduct Risk Assessments • How to assess risk • How to respond to Risk • How to monitor Risk • Resiliency Concepts • Business Impact Analysis • Business Impact Analysis • Incident Response • Disaster Recovery • Business Continuity Fundamentals • Alternative Processing Sites • How to maintain Business Continuity

© 2020 John Knowles (หนังสือเสียง): 9781664914308

วันเปิดตัว

หนังสือเสียง: 24 กันยายน 2563

แท็ก

    คนอื่นก็สนุก...

    1. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    2. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    3. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    4. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    5. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    6. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    7. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    8. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    9. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    10. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    11. AI Ethics
      AI Ethics Mark Coeckelbergh
    12. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    13. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    14. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    15. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    16. Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life
      Is That a Fact?: Frauds, Quacks, and the Real Science of Everyday Life Dr. Joe Schwarcz
    17. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    18. 3D Printing
      3D Printing John M. Jordan
    19. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    20. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
      Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
    21. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
      The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
    22. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
      The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
    23. Haptics
      Haptics Lynette Jones
    24. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    25. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    26. CISSP All-in-One Exam Guide, Ninth Edition
      CISSP All-in-One Exam Guide, Ninth Edition Fernando Maymi
    27. Behavioural Economics: Psychology, neuroscience, and the human side of economics
      Behavioural Economics: Psychology, neuroscience, and the human side of economics David Orrell
    28. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
      Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
    29. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    30. The New Roaring Twenties: Prosper in Volatile Times
      The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
    31. The Road to Reinvention: How to Drive Disruption and Accelerate Transformation
      The Road to Reinvention: How to Drive Disruption and Accelerate Transformation Josh Linkner
    32. Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy
      Catching Up to Crypto: Your Guide to Bitcoin and the New Digital Economy Ben Armstrong
    33. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    34. Billionaires in World Politics
      Billionaires in World Politics Peter Hagel
    35. Disrupting Sacred Cows
      Disrupting Sacred Cows Garrett Gunderson
    36. The Vanishing American Corporation: Navigating the Hazards of a New Economy
      The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
    37. The Legal Analyst: A Toolkit for Thinking about the Law
      The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
    38. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    39. Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
      Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI Reid Blackman
    40. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
      Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
    41. Auto Repair For Dummies: 2nd Edition
      Auto Repair For Dummies: 2nd Edition Deanna Sclar
    42. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    43. Fake Photos
      Fake Photos Hany Farid
    44. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
      The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
    45. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    46. Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers
      Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers Robb Wilson
    47. Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser
      Maxims for Thinking Analytically: The Wisdom of Legendary Harvard Professor Richard Zeckhauser Dan Levy
    48. Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets
      Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets Donald MacKenzie
    49. The Myths of Nutrition and Fitness
      The Myths of Nutrition and Fitness The Great Courses

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม