000 03543nam a22004455i 4500
001 vtls000556372
003 RU-ToGU
005 20210922084848.0
007 cr nn 008mamaa
008 170212s2015 xxu| s |||| 0|eng d
020 _a9781430260837
_9978-1-4302-6083-7
024 7 _a10.1007/978-1-4302-6083-7
_2doi
035 _ato000556372
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aDonaldson, Scott E.
_eauthor.
_9460226
245 1 0 _aEnterprise Cybersecurity
_helectronic resource
_bHow to Build a Successful Cyberdefense Program Against Advanced Threats /
_cby Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
260 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2015.
300 _aXLII, 536 p. 223 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aEnterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.
650 0 _aComputer Science.
_9155490
650 0 _aData encryption (Computer science).
_9566260
650 1 4 _aComputer Science.
_9155490
650 2 4 _aData Encryption.
_9566261
700 1 _aSiegel, Stanley G.
_eauthor.
_9460227
700 1 _aWilliams, Chris K.
_eauthor.
_9460228
700 1 _aAslam, Abdul.
_eauthor.
_9460229
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4302-6083-7
912 _aZDB-2-CWD
999 _c410541