Please use this identifier to cite or link to this item: https://lib.hpu.edu.vn/handle/123456789/26246
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDonaldson, Scott E.en_US
dc.date.accessioned2017-07-25T03:48:12Z
dc.date.available2017-07-25T03:48:12Z
dc.date.issued2015en_US
dc.identifier.isbn978-1-4302-6082-0en_US
dc.identifier.otherHPU4161155en_US
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/26246-
dc.description.abstractEnterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise's computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization's people, budgets, technologies, and processes into a cst-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach.en_US
dc.format.extent536 p.en_US
dc.format.mimetypeapplication/pdfen_US
dc.language.isoenen_US
dc.subjectData Encryptionen_US
dc.subjectCyberdefense Programen_US
dc.subjectEnterprise Cybersecurityen_US
dc.titleEnterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threatsen_US
dc.typeBooken_US
dc.size21.2Mben_US
dc.departmentTechnologyen_US
Appears in Collections:Technology

Files in This Item:
File Description SizeFormat 
1039_Enterprise_Cybersecurity_How_to_Build_a_Successful_Cyberdefense_Program_Against_Advanced_Threats.pdf
  Restricted Access
21.78 MBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.