Building a Comprehensive IT Security Program : Practical Guidelines and Best Practices /

Detalles Bibliográficos
Autor principal: Wittkop, Jeremy. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: eBook
Lenguaje:English
Publicado: Berkeley, CA : Apress : Imprint: Apress, 2016.
Edición:1st ed. 2016.
Materias:
LEADER 01651nam a22003255i 4500
001 000278267
005 20210629144635.0
007 cr nn 008mamaa
008 160727s2016 xxu| s |||| 0|eng d
020 |a 9781484220535 
024 7 |a 10.1007/978-1-4842-2053-5  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
100 1 |a Wittkop, Jeremy.  |e author. 
245 1 0 |a Building a Comprehensive IT Security Program :  |b Practical Guidelines and Best Practices /  |c by Jeremy Wittkop. 
250 |a 1st ed. 2016. 
260 # # |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2016. 
300 |a XIX, 195 p. 13 illus., 8 illus. in color. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter 6: The People Problem -- Chapter 7: Assigning Accountability -- Chapter 8: Shifting the Paradigm -- Chapter 9: The Definition of Insanity -- Chapter 10: Déjà Vu -- Chapter 11: The Information Security Community -- Chapter 12: Partnering with Governments -- . 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 1 4 |a Security. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Structures and Information Theory. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
900 |a Libro descargado a ALEPH en bloque (proveniente de proveedor)