|
|
|
|
LEADER |
01651nam a22003255i 4500 |
001 |
000278267 |
005 |
20210629144635.0 |
007 |
cr nn 008mamaa |
008 |
160727s2016 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484220535
|
024 |
7 |
|
|a 10.1007/978-1-4842-2053-5
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
100 |
1 |
|
|a Wittkop, Jeremy.
|e author.
|
245 |
1 |
0 |
|a Building a Comprehensive IT Security Program :
|b Practical Guidelines and Best Practices /
|c by Jeremy Wittkop.
|
250 |
|
|
|a 1st ed. 2016.
|
260 |
# |
# |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2016.
|
300 |
|
|
|a XIX, 195 p. 13 illus., 8 illus. in color. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
1 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|